Search Results - "tiny encryption algorithm"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices by Rajesh, Sreeja, Paul, Varghese, Menon, Varun G., Khosravi, Mohammad R.

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.02.2019
    Published in Symmetry (Basel) (01.02.2019)
    “…Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT)…”
    Get full text
    Journal Article
  2. 2

    CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management by Kumbhakar, Dulal, Adhikari, Subhajit, Karforma, Sunil

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.04.2025
    Published in Multimedia tools and applications (01.04.2025)
    “…Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of…”
    Get full text
    Journal Article
  3. 3

    ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM by Abdul Ameer, Noor Hayder, Hussain, Zahraa Faiz, Mohammed, May Sabri

    ISSN: 2313-190X, 2520-4912
    Published: University of Information Technology and Communications 01.12.2020
    “…The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous…”
    Get full text
    Journal Article
  4. 4

    A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare by Sutradhar, Shrabani, Karforma, Sunil, Bose, Rajesh, Roy, Sandip

    ISSN: 2772-4425, 2772-4425
    Published: Elsevier Inc 01.11.2023
    Published in Healthcare analytics (New York, N.Y.) (01.11.2023)
    “…Healthcare highly depends on accessing, processing, analyzing, sharing, and storing electronic data. Cloud computing has evolved in various healthcare fields,…”
    Get full text
    Journal Article
  5. 5

    Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things by Chaturvedi, Srishti P., Mukherjee, Rahul, Kumar, Santosh, Yadav, Ajay

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 15.02.2025
    Published in IEEE internet of things journal (15.02.2025)
    “…The future of Internet is envisioned as the Internet of Things (IoT), a concept where countless physical objects, many of which possess limited or minimal…”
    Get full text
    Journal Article
  6. 6

    Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities by Shah, Sunil Kumar, Sharma, Raghavendra, Shukla, Neeraj

    ISSN: 2161-3915, 2161-3915
    Published: Chichester, UK John Wiley & Sons, Ltd 01.02.2025
    “…ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system…”
    Get full text
    Journal Article
  7. 7

    Bi primitive switching crypto system with key generation mechanism for secure applications by Ruhan Bevi, A., Malarvizhi, S.

    ISSN: 0253-3839, 2158-7299
    Published: Taylor & Francis 19.05.2014
    “…Ensuring security to the information transaction is a major challenge in the communication environment. The choice to guarantee the data transfer using a…”
    Get full text
    Journal Article
  8. 8

    Breaching Security of Full Round Tiny Encryption Algorithm by Sobti, Rajeev, Kaushal, Puneet Kumar

    ISSN: 1930-1650, 1930-1669
    Published: Hershey IGI Global 01.01.2018
    “…Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of…”
    Get full text
    Journal Article
  9. 9

    Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System by Li, Ping, Fang, Xiang Qun, Ge, Hai Bo

    ISBN: 303785426X, 9783037854266
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Published: Zurich Trans Tech Publications Ltd 01.06.2012
    Published in Applied Mechanics and Materials (01.06.2012)
    “…The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate…”
    Get full text
    Journal Article
  10. 10

    Study on TEA Encryption for Public Communication Network Wireless Remoter by Ge, Yue Tao, Yin, Xiao Tong, Liu, Xiao Ming

    ISBN: 3038351180, 9783038351184
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Published: Zurich Trans Tech Publications Ltd 01.06.2014
    Published in Applied Mechanics and Materials (01.06.2014)
    “…In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm…”
    Get full text
    Journal Article
  11. 11

    An evolutionary computation attack on one-round TEA by Ma, Eddie Yee-Tak, Obimbo, Charlie

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2011
    Published in Procedia computer science (2011)
    “…In this work, one-round Tiny Encryption Algorithm (TEA) is attacked with an Evolutionary Computation method inspired by a combination of Genetic Algorithm (GA)…”
    Get full text
    Journal Article
  12. 12

    Securing IoT Devices with Enhanced Tiny Encryption Algorithm by S, Bhagya, Jain, Kurunandhan, Krishnan, Prabhakar

    Published: IEEE 04.12.2024
    “…The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational…”
    Get full text
    Conference Proceeding
  13. 13

    Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting by Holden, Joshua

    ISSN: 0161-1194, 1558-1586
    Published: Philadelphia, PA Taylor & Francis Group 01.01.2013
    Published in Cryptologia (01.01.2013)
    “…This article describes Demitasse, a cipher that is intended to be used by inexperienced students in a classroom setting. The cipher is based on the Tiny…”
    Get full text
    Journal Article
  14. 14

    Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking by Diaztary, Windy, Atmajaya, Dedy, Umar, Fitriyani, Purnawansyah, Harlinda, Abdullah, Syahrul Mubarak

    Published: IEEE 09.04.2021
    “…Watermarking is a method embeds a secret imformation into a host such that can not be detected by the human senses. Hiding the secret information such as legal…”
    Get full text
    Conference Proceeding
  15. 15

    Secured IoT Based Smart Greenhouse System with Image Inspection by Sundari.M, Shunmuga, Mathana, J.M, Nagarajan, T.S

    ISBN: 1728151961, 9781728151960
    ISSN: 2575-7288
    Published: IEEE 01.03.2020
    “…Automated Greenhouse System helps the farmers by controlling the environmental parameters through Internet of Things(IoT), including crop health inspection…”
    Get full text
    Conference Proceeding
  16. 16

    Usability Assessment on Symmetric Cryptography Learning Module by Syamsuddin, Irfan, Bramantoro, Arif

    Published: IEEE 13.10.2020
    “…Teaching information security requires lecturer to introduce several tools to encourage students performing hands on practices in better way in order to…”
    Get full text
    Conference Proceeding
  17. 17

    Avoidance of Replay attack in CAN protocol using Authenticated Encryption by Chandrasekaran, Selvamani, Ramachandran, K.I., Adarsh, S., Puranik, Ashish Kumar

    Published: IEEE 01.07.2020
    “…Controller Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection,…”
    Get full text
    Conference Proceeding
  18. 18

    Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library by Budiyanto, Dani, Putro, Prasetyo Adi Wibowo

    Published: IEEE 01.11.2018
    “…Android based open source cryptomator library is an open source library created by Skymatic and published on the cryptomator.org page. This library uses the…”
    Get full text
    Conference Proceeding
  19. 19

    High throughput implementations of cryptography algorithms on GPU and FPGA by Venugopal, Vivek, Shila, Devu Manikantan

    ISBN: 9781467346214, 1467346217
    ISSN: 1091-5281
    Published: IEEE 01.05.2013
    “…Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data…”
    Get full text
    Conference Proceeding
  20. 20

    FPGA Based Implementation Scenarios of TEA Block Cipher by Hussain, Muhammad Awais, Badar, Rabiah

    Published: IEEE 01.12.2015
    “…Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is…”
    Get full text
    Conference Proceeding