Low area field‐programmable gate array implementation of PRESENT image encryption with key rotation and substitution
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptogr...
Uloženo v:
| Vydáno v: | ETRI journal Ročník 43; číslo 6; s. 1113 - 1129 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Electronics and Telecommunications Research Institute (ETRI)
01.12.2021
한국전자통신연구원 |
| Témata: | |
| ISSN: | 1225-6463, 2233-7326 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. |
|---|---|
| AbstractList | Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. AbstractLightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. KCI Citation Count: 3 |
| Author | Alluri, Sreenivas Parikibandla, Srikanth |
| Author_xml | – sequence: 1 givenname: Srikanth orcidid: 0000-0003-3435-8548 surname: Parikibandla fullname: Parikibandla, Srikanth email: psrikanth.bt@gmail.com organization: GITAM Deemed to be University – sequence: 2 givenname: Sreenivas surname: Alluri fullname: Alluri, Sreenivas organization: GITAM Deemed to be University |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002784450$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqFkc2O0zAUhS00SHQG1my9ZZEZ_8VxlqNRYSpVgEpZW7f-CW7TuHI8VNnxCDwjT0KajFiwgIV1pXvOdyz7XKOrLnYOobeU3ApG1Z3LKexvGWGkGA9_gRaMcV5UnMkrtKCMlYUUkr9C132_J6NFlGqBvq_jGUNygH1wrf314-cpxSbB8Qi71uEGshvlBAMOx1Prjq7LkEPscPT482b5ZflxOyrQOOw6k4bTpJ1D_oYPbsApPruhs7h_2vU55KfL4jV66aHt3ZvneYO-vl9uHx6L9acPq4f7dWEEq1VR-ho8qcCakoMgNaFUCVZJxoyva268d8YK8KXZeV8ZDlApZXeGGmm8tMBv0Ls5t0teH0zQEcI0m6gPSd9vtitdq1oIxUfvavbaCHt9SuOz0jAB0yKmRkPKwbROC0-9hLKiXlHhFAFpmappZSsqmTNkzLqbs0yKfZ-c_5NHib7Upae69KUufalrJMq_CBPmz8sJQvsPTs7cObRu-N81erndMMoEUfw3HBuxHQ |
| CitedBy_id | crossref_primary_10_3390_jsan11020024 crossref_primary_10_1145_3701727 |
| Cites_doi | 10.1109/TCSI.2017.2686783 10.1007/s11042-013-1828-7 10.1016/j.aeue.2017.05.047 10.1109/CC.2016.7405712 10.1109/ACCESS.2019.2907717 10.1007/s11071-012-0626-5 10.1049/iet-wss.2012.0127 10.1007/s11042-013-1533-6 10.1016/j.comnet.2010.05.010 10.1007/s00530-013-0323-3 10.1109/ACCESS.2019.2901753 10.1016/j.jnca.2015.09.001 10.1007/s11071-013-1086-2 |
| ContentType | Journal Article |
| Copyright | 1225‐6463/$ © 2021 ETRI |
| Copyright_xml | – notice: 1225‐6463/$ © 2021 ETRI |
| DBID | AAYXX CITATION DOA ACYCR |
| DOI | 10.4218/etrij.2020-0203 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2233-7326 |
| EndPage | 1129 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_9894483 oai_doaj_org_article_4f1f6a571f814e80a6d28917d7162ec0 10_4218_etrij_2020_0203 ETR212408 |
| Genre | article |
| GroupedDBID | -~X .4S .DC .UV 0R~ 1OC 29G 2WC 5GY 5VS 9ZL AAKPC AAYBS ACGFS ACXQS ACYCR ADBBV ADDVE AENEX ALMA_UNASSIGNED_HOLDINGS ARCSS AVUZU BCNDV DU5 E3Z EBS EDO EJD GROUPED_DOAJ IPNFZ ITG ITH JDI KQ8 KVFHK MK~ ML~ O9- OK1 P5Y RIG RNS TR2 TUS WIN XSB AAMMB AAYXX ADMLS AEFGJ AGXDD AIDQK AIDYY ALUQN CITATION OVT |
| ID | FETCH-LOGICAL-c4298-5f9af07adc53a4090118427622cf993cffecd4af5cbff7c3aa788dbc1c6cf6da3 |
| IEDL.DBID | WIN |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000726757600015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1225-6463 |
| IngestDate | Sat Oct 25 08:01:49 EDT 2025 Fri Oct 03 12:45:15 EDT 2025 Sat Nov 29 03:21:29 EST 2025 Tue Nov 18 21:15:02 EST 2025 Wed Jan 22 16:26:53 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Language | English |
| License | http://doi.wiley.com/10.1002/tdm_license_1.1 http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c4298-5f9af07adc53a4090118427622cf993cffecd4af5cbff7c3aa788dbc1c6cf6da3 |
| Notes | https://doi.org/10.4218/etrij.2020-0203 |
| ORCID | 0000-0003-3435-8548 |
| OpenAccessLink | https://doaj.org/article/4f1f6a571f814e80a6d28917d7162ec0 |
| PageCount | 17 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_9894483 doaj_primary_oai_doaj_org_article_4f1f6a571f814e80a6d28917d7162ec0 crossref_primary_10_4218_etrij_2020_0203 crossref_citationtrail_10_4218_etrij_2020_0203 wiley_primary_10_4218_etrij_2020_0203_ETR212408 |
| PublicationCentury | 2000 |
| PublicationDate | December 2021 2021-12-00 2021-12-01 2021-12 |
| PublicationDateYYYYMMDD | 2021-12-01 |
| PublicationDate_xml | – month: 12 year: 2021 text: December 2021 |
| PublicationDecade | 2020 |
| PublicationTitle | ETRI journal |
| PublicationYear | 2021 |
| Publisher | Electronics and Telecommunications Research Institute (ETRI) 한국전자통신연구원 |
| Publisher_xml | – name: Electronics and Telecommunications Research Institute (ETRI) – name: 한국전자통신연구원 |
| References | 2019; 8 2019; 7 2010; 54 2012; 70 2017; 64 2015; 58 2018; 2018 2013; 3 2017; 80 2015; 74 2013; 52 2014; 15 2017 2017; 29 2013 2014; 62 2014; 72 2018; 32 2016; 13 2014; 20 2014; 75 e_1_2_9_20_1 Mondal B. (e_1_2_9_2_1) 2017; 29 e_1_2_9_11_1 e_1_2_9_10_1 Lara‐Nino C. A. (e_1_2_9_6_1) 2018; 2018 e_1_2_9_13_1 e_1_2_9_23_1 e_1_2_9_8_1 e_1_2_9_7_1 Lara‐Nino C. A. (e_1_2_9_17_1) 2017; 64 e_1_2_9_4_1 e_1_2_9_3_1 Haider Z. (e_1_2_9_18_1) 2019; 7 Guosheng Z. (e_1_2_9_22_1) 2016; 13 Hermassi H. (e_1_2_9_12_1) 2013; 52 Biswas K. (e_1_2_9_15_1) 2014; 15 Parikibandla S. (e_1_2_9_24_1) 2019; 8 e_1_2_9_14_1 Cazorla M. (e_1_2_9_5_1) 2013 e_1_2_9_19_1 Zodpe H. (e_1_2_9_21_1) 2018; 32 Rehman A. (e_1_2_9_9_1) 2015; 74 Cho K. (e_1_2_9_16_1) 2014; 62 |
| References_xml | – volume: 62 start-page: 478 issue: 4 year: 2014 end-page: 487 article-title: Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution publication-title: IEEE Trans. Circuits Syst. I. – volume: 7 start-page: 31656 year: 2019 end-page: 31662 article-title: Analysis of an optimal fault attack on the LED‐64 lightweight cryptosystem publication-title: IEEE Access – start-page: 617 year: 2013 end-page: 632 – volume: 80 start-page: 114 year: 2017 end-page: 126 article-title: Generalized fractional logistic map encryption system based on FPGA publication-title: AEU‐Int. J. Electron. Commun. – volume: 20 start-page: 203 issue: 2 year: 2014 end-page: 214 article-title: Enhancing the transmission security of biometric images using chaotic encryption publication-title: Multimed. Syst. – volume: 13 start-page: 150 issue: 1 year: 2016 end-page: 160 article-title: Security analysis and enhanced design of a dynamic block cipher publication-title: China Commun. – volume: 72 start-page: 2211 issue: 3 year: 2014 end-page: 2224 article-title: Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps publication-title: Multimed. Tools Appl. – volume: 2018 year: 2018 article-title: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN publication-title: Sec. Commun. Netw. – start-page: 270 year: 2017 end-page: 278 – volume: 58 start-page: 73 year: 2015 end-page: 93 article-title: A survey on lightweight block ciphers for low‐resource devices: Comparative study and open issues publication-title: J. Network Comput. Appl. – volume: 70 start-page: 2383 issue: 4 year: 2012 end-page: 2388 article-title: Breaking a novel colour image encryption algorithm based on chaos publication-title: Nonlinear Dyn. – volume: 52 start-page: 539 issue: 2013 year: 2013 end-page: 549 article-title: Improvement of an image encryption algorithm based on hyper‐chaos publication-title: Telecommun. Syst. – volume: 75 start-page: 567 year: 2014 end-page: 576 article-title: A novel image encryption algorithm based on dynamic S‐boxes constructed by chaos publication-title: Nonlinear Dyn. – volume: 54 start-page: 2787 issue: 15 year: 2010 end-page: 2805 article-title: The internet of things: A survey publication-title: Comput. Netw. – volume: 32 start-page: 115 issue: 2 year: 2018 end-page: 122 article-title: An efficient AES implementation using FPGA with enhanced security features publication-title: J. King Saud Univ.‐Eng. Sci. – volume: 74 start-page: 4655 issue: 13 year: 2015 end-page: 4677 article-title: Selective encryption for gray images based on chaos and DNA complementary rules publication-title: Multimed. Tools. Appl. – volume: 64 start-page: 2544 issue: 9 year: 2017 end-page: 2555 article-title: Lightweight hardware architectures for the present cipher in FPGA publication-title: IEEE Trans. Circuits Syst. I. – volume: 3 start-page: 298 issue: 4 year: 2013 end-page: 306 article-title: Light‐weight framework for security‐sensitive wireless sensor networks applications publication-title: IET Wirel. Sens. Syst. – start-page: 1 year: 2013 end-page: 6 article-title: Survey and benchmark of lightweight block ciphers for wireless sensor networks publication-title: Proc. Int. Conf. Secur. Cryptogr. (Reykjavik, Iceland), July – volume: 15 start-page: 2801 issue: 15 year: 2014 end-page: 2809 article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks publication-title: IEEE Sens. J. – volume: 29 start-page: 499 issue: 2 year: 2017 end-page: 504 article-title: A light weight secure image encryption scheme based on chaos & DNA computing publication-title: J. King Saud Univ.‐Comput. Inf. Sci. – volume: 7 start-page: 46045 year: 2019 end-page: 46058 article-title: A low‐cost self‐test architecture integrated with PRESENT cipher core publication-title: IEEE Access – volume: 8 issue: 2 year: 2019 article-title: Lorentz chaotic system key generation with Low area FPGA implementation using PRESENT security algorithm publication-title: Int. J. Recent Technol. Eng. – volume: 29 start-page: 499 issue: 2 year: 2017 ident: e_1_2_9_2_1 article-title: A light weight secure image encryption scheme based on chaos & DNA computing publication-title: J. King Saud Univ.‐Comput. Inf. Sci. – volume: 64 start-page: 2544 issue: 9 year: 2017 ident: e_1_2_9_17_1 article-title: Lightweight hardware architectures for the present cipher in FPGA publication-title: IEEE Trans. Circuits Syst. I. doi: 10.1109/TCSI.2017.2686783 – volume: 52 start-page: 539 issue: 2013 year: 2013 ident: e_1_2_9_12_1 article-title: Improvement of an image encryption algorithm based on hyper‐chaos publication-title: Telecommun. Syst. – volume: 74 start-page: 4655 issue: 13 year: 2015 ident: e_1_2_9_9_1 article-title: Selective encryption for gray images based on chaos and DNA complementary rules publication-title: Multimed. Tools. Appl. doi: 10.1007/s11042-013-1828-7 – ident: e_1_2_9_20_1 doi: 10.1016/j.aeue.2017.05.047 – ident: e_1_2_9_3_1 – volume: 13 start-page: 150 issue: 1 year: 2016 ident: e_1_2_9_22_1 article-title: Security analysis and enhanced design of a dynamic block cipher publication-title: China Commun. doi: 10.1109/CC.2016.7405712 – volume: 7 start-page: 46045 year: 2019 ident: e_1_2_9_18_1 article-title: A low‐cost self‐test architecture integrated with PRESENT cipher core publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2907717 – volume: 32 start-page: 115 issue: 2 year: 2018 ident: e_1_2_9_21_1 article-title: An efficient AES implementation using FPGA with enhanced security features publication-title: J. King Saud Univ.‐Eng. Sci. – ident: e_1_2_9_11_1 doi: 10.1007/s11071-012-0626-5 – start-page: 1 year: 2013 ident: e_1_2_9_5_1 article-title: Survey and benchmark of lightweight block ciphers for wireless sensor networks publication-title: Proc. Int. Conf. Secur. Cryptogr. (Reykjavik, Iceland), July – ident: e_1_2_9_8_1 doi: 10.1049/iet-wss.2012.0127 – volume: 2018 start-page: 5087065 year: 2018 ident: e_1_2_9_6_1 article-title: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN publication-title: Sec. Commun. Netw. – ident: e_1_2_9_13_1 doi: 10.1007/s11042-013-1533-6 – ident: e_1_2_9_7_1 doi: 10.1016/j.comnet.2010.05.010 – volume: 62 start-page: 478 issue: 4 year: 2014 ident: e_1_2_9_16_1 article-title: Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution publication-title: IEEE Trans. Circuits Syst. I. – ident: e_1_2_9_10_1 doi: 10.1007/s00530-013-0323-3 – ident: e_1_2_9_23_1 – volume: 15 start-page: 2801 issue: 15 year: 2014 ident: e_1_2_9_15_1 article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks publication-title: IEEE Sens. J. – ident: e_1_2_9_19_1 doi: 10.1109/ACCESS.2019.2901753 – ident: e_1_2_9_4_1 doi: 10.1016/j.jnca.2015.09.001 – volume: 8 issue: 2 year: 2019 ident: e_1_2_9_24_1 article-title: Lorentz chaotic system key generation with Low area FPGA implementation using PRESENT security algorithm publication-title: Int. J. Recent Technol. Eng. – ident: e_1_2_9_14_1 doi: 10.1007/s11071-013-1086-2 |
| SSID | ssj0020458 |
| Score | 2.2720642 |
| Snippet | Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded... AbstractLightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network,... |
| SourceID | nrf doaj crossref wiley |
| SourceType | Open Website Enrichment Source Index Database Publisher |
| StartPage | 1113 |
| SubjectTerms | cryptography key rotation and substitution lightweight symmetric ciphers PRESENT encryption wireless sensor network 전자/정보통신공학 |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA4iHvQgPnF9EcSDl7p9pE32qLKLgiwiq3gL6bSR9dFKXVf25k_wN_pLnEm7ogfx4qmQBw2Tycx8yeQLY_tpatGtKeFheKwQoIgA7aBIPAhTlUZ-CPVRzPW57PfVzU3n4ttTX5QTVtMD14JrCxvYxMQysCoQufJNkiFGCGRG1Ec5OLTuy84UTDVQi47_CGqhtnqJSKKa1EegP2vTQ1V3CAwRNtEp3A9_5Gj70csUlf0ZrDpv01tii02YyI_q4S2zmbxYYQvfyANX2fi8fOUGYz7ustA-3t6bXKtHug3FaXsMqysz4cPHaZI4zQIvLSe5d_sDrEFzwlFRq4kzHZy2ZTmua16VTWtTZPwZrYtLKcCCNXbV6w5OTr3mFQUP0NcoL7YdY31pMogjg2iOrpqKEG1gCBaDE6C0kUwYG0NqrYTIGETFWQoBJGCTzETrbLYoi3yDcWlSiYs4B2ViIbNAAbHLIGAJEmJyVy12OJWlhoZinF66eNAINUj42glfk_A1Cb_FDr46PNXsGr83PabJ-WpGtNiuAJVFN8qi_1KWFtvDqdX3MHT96Xtb6vtKI3g408RFLxT-qe1m_q8R6e7gEh2_8NXmf4xti82HlC_jUmW22eyoesl32ByMR8Pnatep9ydQ_vyh priority: 102 providerName: Directory of Open Access Journals |
| Title | Low area field‐programmable gate array implementation of PRESENT image encryption with key rotation and substitution |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2020-0203 https://doaj.org/article/4f1f6a571f814e80a6d28917d7162ec0 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002784450 |
| Volume | 43 |
| WOSCitedRecordID | wos000726757600015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | ETRI Journal, 2021, 43(6), , pp.1113-1129 |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVWIB databaseName: Wiley Online Library Free Content customDbUrl: eissn: 2233-7326 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0020458 issn: 1225-6463 databaseCode: WIN dateStart: 19970101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS-wwFA4iLnThWxxfBLkLN9WmTdu4VBlRkEEuc-91F9LTRsZHK3FU3PkT_I3-Es9J63AVRARXhTZpS87zS06-MPYrzy2GNSUDTI8VAhQp0A_KNIAoV3kcRtAsxfw9yXo9dXa2e9pWE9JemIYfYjThRpbh_TUZuMn9KSQSoxIJcegGFwjwEP7Qahp6YSG9af477o0gFy0DEuRCrQ1SmcYNuQ-9YedD_3dxydP3Y7SpnH2ftPqoczjzA_87y6bblJPvNToyx8bKap5N_UdEuMDuT-oHbjB_5L6i7eXpua3buqadVZym2vCxM498cP1WcE4S5bXlJMNur49P0DVxVHr36N0Qpylejj6Cu7ptbaqC36Kn8uUJeGOR_Tns9g-OgvZEhgAwbqkgsbvGhpkpIIkNIkPatioj9KcRWEx0gEpQCmlsArm1GcTGIMIuchCQgk0LEy-x8aquymXGM5Nn6BBKUCaRWSEUEFMNgh-REiu86rDtN3loaOnK6dSMK42whYZU-wHVNKCaBrTDtkYdbhqmjs-b7pOAR82IYtvfqN25bi1WSytsapJMWCVkqUKTFghORVYQ51YJYYdtonroSxj4_nQ9r_Wl0whEjjXx2kuFX9rxOvHVH-lu_zcmETJUK9_uscomIyq08TU2a2x86O7KdTYB98PBrdvwkwwb3ipeASHeDww |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5BQaIcaHmJBUotxIFLaB6O4x4BbdUV2xyqBfVmOZO4WkqTyl2KeuMn8Bv5Jcw46apFQhVST5ESO7E8z88efwF4U1WOwpqWEaXHmgCKTMgPShVhWukqi1Pst2K-TIuy1AcH25fPwvT8EMsFN7aM4K_ZwHlBmq1cUlhiKS78_CshPMI_vJ12G-5IRfk7nyqZlEvQxRuBDLpIbyMlVdbT-_Artv56wZXIFAj8Kd603l1NW0Pc2Vm7iRGvw4Mh6xTvezV5CLea9hHcv8RF-BjOpt0PYSmFFKGo7ffPX0Pp1jEfrhK82kaPvT0X8-OLmnMWquicYDGOyxk9Ie8kSO_9efBEgld5BbkJ4buhtW1rcUrOKlQo0I0n8HlnPPu4Gw0_ZYiQQpeOcrdtXVzYGvPMEjjkk6syJZeaoqNcB7kKpZbW5Vg5V2BmLYHsusIEFTpV2-wprLRd2zwDUdiqIJ_QoLa5LOpEI5PVEP5JFBPD6xG8uxCIwYGxnH-c8c0QcuEpNWFCDU-o4Qkdwdtlh5OerOPfTT-whJfNmGU73Oj8oRmM1kiXOGXzInE6kY2OraoJnyZFzbRbDcYjeE36YY5wHvrz9bAzR94QFpkYpraXmr60FZTiuhGZ8Wyf8ggZ6-f_3WMT7u3O9qZmOik_vYDVlOtuQsnNS1hZ-O_NBtzFs8X81L8KxvEH2oASRw |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3LbtQwFL0qLUJ0QXkUMS0FC7FgE5qH47jLQmfUEaMIoQF1Zzl2XA2lSeUOrbrrJ_CNfEnvddJRi1QhJFaREjuxfJ_Hvj4BeFtVDsOa5BGmxxIBCk_QD3IRmbSSVRanptuK-TYpylIeHOzcPAvT8UMsFtzIMoK_JgOvT6wjK-cYlkiKcz_7jggP8Q9tp92DFS4wANKpknG5AF20EUigC_U2ElxkHb0PvWL7jxfcikyBwB_jTePd7bQ1xJ3R2v8Y8WN41GedbLdTkyewVDdPYfUGF-EzOJu050xjCslCUdvvy1996dYxHa5itNqGj72-YLPj65pzEiprHSMxDsspPkHvxFDv_UXwRIxWeRm6CebbvrVuLDtFZxUqFPDGOnwdDacf96P-pwyRwdAlo9ztaBcX2po80wgO6eQqT9GlpsZhrmOoCsVy7XJTOVeYTGsE2bYyiRHGCauz57DctE39AlihqwJ9Qm2kznlhE2mIrAbxTyKIGF4O4P21QJTpGcvpxxk_FCIXmlIVJlTRhCqa0AG8W3Q46cg67m76gSS8aEYs2-FG6w9Vb7SKu8QJnReJkwmvZayFRXyaFJZot2oTD-AN6oc6MrPQn66HrTryCrHIWBG1PZf4pe2gFH8bkRpOv2AewWO58c89XsODz3sjNRmXnzbhYUplN6Hi5iUsz_3Pegvum7P57NS_CrZxBS6WEbk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Low+area+field%E2%80%90programmable+gate+array+implementation+of+PRESENT+image+encryption+with+key+rotation+and+substitution&rft.jtitle=ETRI+journal&rft.au=Parikibandla%2C+Srikanth&rft.au=Alluri%2C+Sreenivas&rft.date=2021-12-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=43&rft.issue=6&rft.spage=1113&rft.epage=1129&rft_id=info:doi/10.4218%2Fetrij.2020-0203&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_2020_0203 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon |