Search Results - "tiny encryption algorithm"
-
1
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.02.2019Published in Symmetry (Basel) (01.02.2019)“…Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT)…”
Get full text
Journal Article -
2
CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.04.2025Published in Multimedia tools and applications (01.04.2025)“…Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of…”
Get full text
Journal Article -
3
ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM
ISSN: 2313-190X, 2520-4912Published: University of Information Technology and Communications 01.12.2020Published in Iraqi journal for computers and informatics (Online) (01.12.2020)“…The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous…”
Get full text
Journal Article -
4
A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare
ISSN: 2772-4425, 2772-4425Published: Elsevier Inc 01.11.2023Published in Healthcare analytics (New York, N.Y.) (01.11.2023)“…Healthcare highly depends on accessing, processing, analyzing, sharing, and storing electronic data. Cloud computing has evolved in various healthcare fields,…”
Get full text
Journal Article -
5
Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 15.02.2025Published in IEEE internet of things journal (15.02.2025)“…The future of Internet is envisioned as the Internet of Things (IoT), a concept where countless physical objects, many of which possess limited or minimal…”
Get full text
Journal Article -
6
Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities
ISSN: 2161-3915, 2161-3915Published: Chichester, UK John Wiley & Sons, Ltd 01.02.2025Published in Transactions on emerging telecommunications technologies (01.02.2025)“…ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system…”
Get full text
Journal Article -
7
Bi primitive switching crypto system with key generation mechanism for secure applications
ISSN: 0253-3839, 2158-7299Published: Taylor & Francis 19.05.2014Published in Journal of the Chinese Institute of Engineers (19.05.2014)“…Ensuring security to the information transaction is a major challenge in the communication environment. The choice to guarantee the data transfer using a…”
Get full text
Journal Article -
8
Breaching Security of Full Round Tiny Encryption Algorithm
ISSN: 1930-1650, 1930-1669Published: Hershey IGI Global 01.01.2018Published in International journal of information security and privacy (01.01.2018)“…Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of…”
Get full text
Journal Article -
9
Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System
ISBN: 303785426X, 9783037854266ISSN: 1660-9336, 1662-7482, 1662-7482Published: Zurich Trans Tech Publications Ltd 01.06.2012Published in Applied Mechanics and Materials (01.06.2012)“…The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate…”
Get full text
Journal Article -
10
Study on TEA Encryption for Public Communication Network Wireless Remoter
ISBN: 3038351180, 9783038351184ISSN: 1660-9336, 1662-7482, 1662-7482Published: Zurich Trans Tech Publications Ltd 01.06.2014Published in Applied Mechanics and Materials (01.06.2014)“…In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm…”
Get full text
Journal Article -
11
An evolutionary computation attack on one-round TEA
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2011Published in Procedia computer science (2011)“…In this work, one-round Tiny Encryption Algorithm (TEA) is attacked with an Evolutionary Computation method inspired by a combination of Genetic Algorithm (GA)…”
Get full text
Journal Article -
12
Securing IoT Devices with Enhanced Tiny Encryption Algorithm
Published: IEEE 04.12.2024Published in 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS) (04.12.2024)“…The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational…”
Get full text
Conference Proceeding -
13
Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting
ISSN: 0161-1194, 1558-1586Published: Philadelphia, PA Taylor & Francis Group 01.01.2013Published in Cryptologia (01.01.2013)“…This article describes Demitasse, a cipher that is intended to be used by inexperienced students in a classroom setting. The cipher is based on the Tiny…”
Get full text
Journal Article -
14
Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking
Published: IEEE 09.04.2021Published in 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT) (09.04.2021)“…Watermarking is a method embeds a secret imformation into a host such that can not be detected by the human senses. Hiding the secret information such as legal…”
Get full text
Conference Proceeding -
15
Secured IoT Based Smart Greenhouse System with Image Inspection
ISBN: 1728151961, 9781728151960ISSN: 2575-7288Published: IEEE 01.03.2020Published in International Conference on Advanced Computing and Communication Systems (Online) (01.03.2020)“…Automated Greenhouse System helps the farmers by controlling the environmental parameters through Internet of Things(IoT), including crop health inspection…”
Get full text
Conference Proceeding -
16
Usability Assessment on Symmetric Cryptography Learning Module
Published: IEEE 13.10.2020Published in 2020 2nd International Conference on Computer and Information Sciences (ICCIS) (13.10.2020)“…Teaching information security requires lecturer to introduce several tools to encourage students performing hands on practices in better way in order to…”
Get full text
Conference Proceeding -
17
Avoidance of Replay attack in CAN protocol using Authenticated Encryption
Published: IEEE 01.07.2020Published in 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (01.07.2020)“…Controller Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection,…”
Get full text
Conference Proceeding -
18
Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library
Published: IEEE 01.11.2018Published in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (01.11.2018)“…Android based open source cryptomator library is an open source library created by Skymatic and published on the cryptomator.org page. This library uses the…”
Get full text
Conference Proceeding -
19
High throughput implementations of cryptography algorithms on GPU and FPGA
ISBN: 9781467346214, 1467346217ISSN: 1091-5281Published: IEEE 01.05.2013Published in 2013 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) (01.05.2013)“…Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data…”
Get full text
Conference Proceeding -
20
FPGA Based Implementation Scenarios of TEA Block Cipher
Published: IEEE 01.12.2015Published in 2015 13th International Conference on Frontiers of Information Technology (FIT) (01.12.2015)“…Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is…”
Get full text
Conference Proceeding

