Low area field‐programmable gate array implementation of PRESENT image encryption with key rotation and substitution

Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptogr...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:ETRI journal Ročník 43; číslo 6; s. 1113 - 1129
Hlavní autoři: Parikibandla, Srikanth, Alluri, Sreenivas
Médium: Journal Article
Jazyk:angličtina
Vydáno: Electronics and Telecommunications Research Institute (ETRI) 01.12.2021
한국전자통신연구원
Témata:
ISSN:1225-6463, 2233-7326
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.
AbstractList Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.
AbstractLightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra‐lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary‐coded decimal‐based key generation used in image encryption. The key rotation and substitution‐based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field‐programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. KCI Citation Count: 3
Author Alluri, Sreenivas
Parikibandla, Srikanth
Author_xml – sequence: 1
  givenname: Srikanth
  orcidid: 0000-0003-3435-8548
  surname: Parikibandla
  fullname: Parikibandla, Srikanth
  email: psrikanth.bt@gmail.com
  organization: GITAM Deemed to be University
– sequence: 2
  givenname: Sreenivas
  surname: Alluri
  fullname: Alluri, Sreenivas
  organization: GITAM Deemed to be University
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002784450$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqFkc2O0zAUhS00SHQG1my9ZZEZ_8VxlqNRYSpVgEpZW7f-CW7TuHI8VNnxCDwjT0KajFiwgIV1pXvOdyz7XKOrLnYOobeU3ApG1Z3LKexvGWGkGA9_gRaMcV5UnMkrtKCMlYUUkr9C132_J6NFlGqBvq_jGUNygH1wrf314-cpxSbB8Qi71uEGshvlBAMOx1Prjq7LkEPscPT482b5ZflxOyrQOOw6k4bTpJ1D_oYPbsApPruhs7h_2vU55KfL4jV66aHt3ZvneYO-vl9uHx6L9acPq4f7dWEEq1VR-ho8qcCakoMgNaFUCVZJxoyva268d8YK8KXZeV8ZDlApZXeGGmm8tMBv0Ls5t0teH0zQEcI0m6gPSd9vtitdq1oIxUfvavbaCHt9SuOz0jAB0yKmRkPKwbROC0-9hLKiXlHhFAFpmappZSsqmTNkzLqbs0yKfZ-c_5NHib7Upae69KUufalrJMq_CBPmz8sJQvsPTs7cObRu-N81erndMMoEUfw3HBuxHQ
CitedBy_id crossref_primary_10_3390_jsan11020024
crossref_primary_10_1145_3701727
Cites_doi 10.1109/TCSI.2017.2686783
10.1007/s11042-013-1828-7
10.1016/j.aeue.2017.05.047
10.1109/CC.2016.7405712
10.1109/ACCESS.2019.2907717
10.1007/s11071-012-0626-5
10.1049/iet-wss.2012.0127
10.1007/s11042-013-1533-6
10.1016/j.comnet.2010.05.010
10.1007/s00530-013-0323-3
10.1109/ACCESS.2019.2901753
10.1016/j.jnca.2015.09.001
10.1007/s11071-013-1086-2
ContentType Journal Article
Copyright 1225‐6463/$ © 2021 ETRI
Copyright_xml – notice: 1225‐6463/$ © 2021 ETRI
DBID AAYXX
CITATION
DOA
ACYCR
DOI 10.4218/etrij.2020-0203
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2233-7326
EndPage 1129
ExternalDocumentID oai_kci_go_kr_ARTI_9894483
oai_doaj_org_article_4f1f6a571f814e80a6d28917d7162ec0
10_4218_etrij_2020_0203
ETR212408
Genre article
GroupedDBID -~X
.4S
.DC
.UV
0R~
1OC
29G
2WC
5GY
5VS
9ZL
AAKPC
AAYBS
ACGFS
ACXQS
ACYCR
ADBBV
ADDVE
AENEX
ALMA_UNASSIGNED_HOLDINGS
ARCSS
AVUZU
BCNDV
DU5
E3Z
EBS
EDO
EJD
GROUPED_DOAJ
IPNFZ
ITG
ITH
JDI
KQ8
KVFHK
MK~
ML~
O9-
OK1
P5Y
RIG
RNS
TR2
TUS
WIN
XSB
AAMMB
AAYXX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
OVT
ID FETCH-LOGICAL-c4298-5f9af07adc53a4090118427622cf993cffecd4af5cbff7c3aa788dbc1c6cf6da3
IEDL.DBID WIN
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000726757600015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1225-6463
IngestDate Sat Oct 25 08:01:49 EDT 2025
Fri Oct 03 12:45:15 EDT 2025
Sat Nov 29 03:21:29 EST 2025
Tue Nov 18 21:15:02 EST 2025
Wed Jan 22 16:26:53 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License http://doi.wiley.com/10.1002/tdm_license_1.1
http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c4298-5f9af07adc53a4090118427622cf993cffecd4af5cbff7c3aa788dbc1c6cf6da3
Notes https://doi.org/10.4218/etrij.2020-0203
ORCID 0000-0003-3435-8548
OpenAccessLink https://doaj.org/article/4f1f6a571f814e80a6d28917d7162ec0
PageCount 17
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_9894483
doaj_primary_oai_doaj_org_article_4f1f6a571f814e80a6d28917d7162ec0
crossref_primary_10_4218_etrij_2020_0203
crossref_citationtrail_10_4218_etrij_2020_0203
wiley_primary_10_4218_etrij_2020_0203_ETR212408
PublicationCentury 2000
PublicationDate December 2021
2021-12-00
2021-12-01
2021-12
PublicationDateYYYYMMDD 2021-12-01
PublicationDate_xml – month: 12
  year: 2021
  text: December 2021
PublicationDecade 2020
PublicationTitle ETRI journal
PublicationYear 2021
Publisher Electronics and Telecommunications Research Institute (ETRI)
한국전자통신연구원
Publisher_xml – name: Electronics and Telecommunications Research Institute (ETRI)
– name: 한국전자통신연구원
References 2019; 8
2019; 7
2010; 54
2012; 70
2017; 64
2015; 58
2018; 2018
2013; 3
2017; 80
2015; 74
2013; 52
2014; 15
2017
2017; 29
2013
2014; 62
2014; 72
2018; 32
2016; 13
2014; 20
2014; 75
e_1_2_9_20_1
Mondal B. (e_1_2_9_2_1) 2017; 29
e_1_2_9_11_1
e_1_2_9_10_1
Lara‐Nino C. A. (e_1_2_9_6_1) 2018; 2018
e_1_2_9_13_1
e_1_2_9_23_1
e_1_2_9_8_1
e_1_2_9_7_1
Lara‐Nino C. A. (e_1_2_9_17_1) 2017; 64
e_1_2_9_4_1
e_1_2_9_3_1
Haider Z. (e_1_2_9_18_1) 2019; 7
Guosheng Z. (e_1_2_9_22_1) 2016; 13
Hermassi H. (e_1_2_9_12_1) 2013; 52
Biswas K. (e_1_2_9_15_1) 2014; 15
Parikibandla S. (e_1_2_9_24_1) 2019; 8
e_1_2_9_14_1
Cazorla M. (e_1_2_9_5_1) 2013
e_1_2_9_19_1
Zodpe H. (e_1_2_9_21_1) 2018; 32
Rehman A. (e_1_2_9_9_1) 2015; 74
Cho K. (e_1_2_9_16_1) 2014; 62
References_xml – volume: 62
  start-page: 478
  issue: 4
  year: 2014
  end-page: 487
  article-title: Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution
  publication-title: IEEE Trans. Circuits Syst. I.
– volume: 7
  start-page: 31656
  year: 2019
  end-page: 31662
  article-title: Analysis of an optimal fault attack on the LED‐64 lightweight cryptosystem
  publication-title: IEEE Access
– start-page: 617
  year: 2013
  end-page: 632
– volume: 80
  start-page: 114
  year: 2017
  end-page: 126
  article-title: Generalized fractional logistic map encryption system based on FPGA
  publication-title: AEU‐Int. J. Electron. Commun.
– volume: 20
  start-page: 203
  issue: 2
  year: 2014
  end-page: 214
  article-title: Enhancing the transmission security of biometric images using chaotic encryption
  publication-title: Multimed. Syst.
– volume: 13
  start-page: 150
  issue: 1
  year: 2016
  end-page: 160
  article-title: Security analysis and enhanced design of a dynamic block cipher
  publication-title: China Commun.
– volume: 72
  start-page: 2211
  issue: 3
  year: 2014
  end-page: 2224
  article-title: Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps
  publication-title: Multimed. Tools Appl.
– volume: 2018
  year: 2018
  article-title: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN
  publication-title: Sec. Commun. Netw.
– start-page: 270
  year: 2017
  end-page: 278
– volume: 58
  start-page: 73
  year: 2015
  end-page: 93
  article-title: A survey on lightweight block ciphers for low‐resource devices: Comparative study and open issues
  publication-title: J. Network Comput. Appl.
– volume: 70
  start-page: 2383
  issue: 4
  year: 2012
  end-page: 2388
  article-title: Breaking a novel colour image encryption algorithm based on chaos
  publication-title: Nonlinear Dyn.
– volume: 52
  start-page: 539
  issue: 2013
  year: 2013
  end-page: 549
  article-title: Improvement of an image encryption algorithm based on hyper‐chaos
  publication-title: Telecommun. Syst.
– volume: 75
  start-page: 567
  year: 2014
  end-page: 576
  article-title: A novel image encryption algorithm based on dynamic S‐boxes constructed by chaos
  publication-title: Nonlinear Dyn.
– volume: 54
  start-page: 2787
  issue: 15
  year: 2010
  end-page: 2805
  article-title: The internet of things: A survey
  publication-title: Comput. Netw.
– volume: 32
  start-page: 115
  issue: 2
  year: 2018
  end-page: 122
  article-title: An efficient AES implementation using FPGA with enhanced security features
  publication-title: J. King Saud Univ.‐Eng. Sci.
– volume: 74
  start-page: 4655
  issue: 13
  year: 2015
  end-page: 4677
  article-title: Selective encryption for gray images based on chaos and DNA complementary rules
  publication-title: Multimed. Tools. Appl.
– volume: 64
  start-page: 2544
  issue: 9
  year: 2017
  end-page: 2555
  article-title: Lightweight hardware architectures for the present cipher in FPGA
  publication-title: IEEE Trans. Circuits Syst. I.
– volume: 3
  start-page: 298
  issue: 4
  year: 2013
  end-page: 306
  article-title: Light‐weight framework for security‐sensitive wireless sensor networks applications
  publication-title: IET Wirel. Sens. Syst.
– start-page: 1
  year: 2013
  end-page: 6
  article-title: Survey and benchmark of lightweight block ciphers for wireless sensor networks
  publication-title: Proc. Int. Conf. Secur. Cryptogr. (Reykjavik, Iceland), July
– volume: 15
  start-page: 2801
  issue: 15
  year: 2014
  end-page: 2809
  article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks
  publication-title: IEEE Sens. J.
– volume: 29
  start-page: 499
  issue: 2
  year: 2017
  end-page: 504
  article-title: A light weight secure image encryption scheme based on chaos & DNA computing
  publication-title: J. King Saud Univ.‐Comput. Inf. Sci.
– volume: 7
  start-page: 46045
  year: 2019
  end-page: 46058
  article-title: A low‐cost self‐test architecture integrated with PRESENT cipher core
  publication-title: IEEE Access
– volume: 8
  issue: 2
  year: 2019
  article-title: Lorentz chaotic system key generation with Low area FPGA implementation using PRESENT security algorithm
  publication-title: Int. J. Recent Technol. Eng.
– volume: 29
  start-page: 499
  issue: 2
  year: 2017
  ident: e_1_2_9_2_1
  article-title: A light weight secure image encryption scheme based on chaos & DNA computing
  publication-title: J. King Saud Univ.‐Comput. Inf. Sci.
– volume: 64
  start-page: 2544
  issue: 9
  year: 2017
  ident: e_1_2_9_17_1
  article-title: Lightweight hardware architectures for the present cipher in FPGA
  publication-title: IEEE Trans. Circuits Syst. I.
  doi: 10.1109/TCSI.2017.2686783
– volume: 52
  start-page: 539
  issue: 2013
  year: 2013
  ident: e_1_2_9_12_1
  article-title: Improvement of an image encryption algorithm based on hyper‐chaos
  publication-title: Telecommun. Syst.
– volume: 74
  start-page: 4655
  issue: 13
  year: 2015
  ident: e_1_2_9_9_1
  article-title: Selective encryption for gray images based on chaos and DNA complementary rules
  publication-title: Multimed. Tools. Appl.
  doi: 10.1007/s11042-013-1828-7
– ident: e_1_2_9_20_1
  doi: 10.1016/j.aeue.2017.05.047
– ident: e_1_2_9_3_1
– volume: 13
  start-page: 150
  issue: 1
  year: 2016
  ident: e_1_2_9_22_1
  article-title: Security analysis and enhanced design of a dynamic block cipher
  publication-title: China Commun.
  doi: 10.1109/CC.2016.7405712
– volume: 7
  start-page: 46045
  year: 2019
  ident: e_1_2_9_18_1
  article-title: A low‐cost self‐test architecture integrated with PRESENT cipher core
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2907717
– volume: 32
  start-page: 115
  issue: 2
  year: 2018
  ident: e_1_2_9_21_1
  article-title: An efficient AES implementation using FPGA with enhanced security features
  publication-title: J. King Saud Univ.‐Eng. Sci.
– ident: e_1_2_9_11_1
  doi: 10.1007/s11071-012-0626-5
– start-page: 1
  year: 2013
  ident: e_1_2_9_5_1
  article-title: Survey and benchmark of lightweight block ciphers for wireless sensor networks
  publication-title: Proc. Int. Conf. Secur. Cryptogr. (Reykjavik, Iceland), July
– ident: e_1_2_9_8_1
  doi: 10.1049/iet-wss.2012.0127
– volume: 2018
  start-page: 5087065
  year: 2018
  ident: e_1_2_9_6_1
  article-title: Energy and area costs of lightweight cryptographic algorithms for authenticated encryption in WSN
  publication-title: Sec. Commun. Netw.
– ident: e_1_2_9_13_1
  doi: 10.1007/s11042-013-1533-6
– ident: e_1_2_9_7_1
  doi: 10.1016/j.comnet.2010.05.010
– volume: 62
  start-page: 478
  issue: 4
  year: 2014
  ident: e_1_2_9_16_1
  article-title: Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution
  publication-title: IEEE Trans. Circuits Syst. I.
– ident: e_1_2_9_10_1
  doi: 10.1007/s00530-013-0323-3
– ident: e_1_2_9_23_1
– volume: 15
  start-page: 2801
  issue: 15
  year: 2014
  ident: e_1_2_9_15_1
  article-title: An encryption scheme using chaotic map and genetic operations for wireless sensor networks
  publication-title: IEEE Sens. J.
– ident: e_1_2_9_19_1
  doi: 10.1109/ACCESS.2019.2901753
– ident: e_1_2_9_4_1
  doi: 10.1016/j.jnca.2015.09.001
– volume: 8
  issue: 2
  year: 2019
  ident: e_1_2_9_24_1
  article-title: Lorentz chaotic system key generation with Low area FPGA implementation using PRESENT security algorithm
  publication-title: Int. J. Recent Technol. Eng.
– ident: e_1_2_9_14_1
  doi: 10.1007/s11071-013-1086-2
SSID ssj0020458
Score 2.2720642
Snippet Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded...
AbstractLightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network,...
SourceID nrf
doaj
crossref
wiley
SourceType Open Website
Enrichment Source
Index Database
Publisher
StartPage 1113
SubjectTerms cryptography
key rotation and substitution
lightweight symmetric ciphers
PRESENT encryption
wireless sensor network
전자/정보통신공학
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBYh9JAeSpu0dNMHovTQi7t-yLZ8TMqGBsJSwhZyE-ORp2zT2MF5kVt-Qn9jfklmZG9IDiWXngyyhMXMeEafNPpGqc_WGLDs-SPMfR0ZxhARJD6NoMiI4srGhgJl_kE5n9ujo-rHg1JfkhM20AMPgpsaSqiAvEzIJqaxMRSeMUJSeqE-ajCg9bisVmBqhFpy_CdQi601KkyRDaQ-huPZVApV_WZgyLBJTuEexaNA289Rpu3p8WI1RJu9l-rFuEzUO8P0Xqm1pt1Uzx-QB26py4PuSgOv-XTIQru9-TvmWp3IbSgt22P8uodrvTxZJYmLFnRHWuQ-my_4DbsTzYbaXwfXoWVbVvN_rftu7A2t12fsXUJKATe8Vj_3Zotv36OxikKEHGtslFMFFJfgMc-A0ZxcNTUp-8AUiRcnKGkj3gDlWBOVmAEwKvY1JlggFR6yN2q97drmrdJ5A02d13WSxmBqMnWMntIcoaq8R2sm6utKlg5HinGpdPHHMdQQ4bsgfCfCdyL8ifpyP-B0YNf4d9ddUc59N6HFDg1sLG40FveUsUzUJ1atO8ZlGC_PX5077h2Dh30nXPTG8pemQfNPzcjNFocc-E1st__H3N6pjVTyZUKqzHu1ft5fNB_UM7w8X571H4N53wH3mf8n
  priority: 102
  providerName: Directory of Open Access Journals
Title Low area field‐programmable gate array implementation of PRESENT image encryption with key rotation and substitution
URI https://onlinelibrary.wiley.com/doi/abs/10.4218%2Fetrij.2020-0203
https://doaj.org/article/4f1f6a571f814e80a6d28917d7162ec0
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002784450
Volume 43
WOSCitedRecordID wos000726757600015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX ETRI Journal, 2021, 43(6), , pp.1113-1129
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVWIB
  databaseName: Wiley Online Library Free Content
  customDbUrl:
  eissn: 2233-7326
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0020458
  issn: 1225-6463
  databaseCode: WIN
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1PaxQxFA-leKgHq1Vxq5ZQPHgZO38yM5mjyhYLZSllxd7CSzKvrLUzkm5bevMj9DP2k_hedrpYQaTQ08BMMhPy_v4yL78I8U4rBZo8f-JKbxNFGCKBzOcJVAVi2uhUYaTM368nE3101BwM1YS8F2bBD7FccGPLiP6aDRxsPIVEUVRiIc7D7DsBPII__DeNvHCmoml-25ssIRf_BmTIRVqbVKoqFuQ-_Iadv_rfiUuRvp-iTRfwbtIao87u-gOM96l4MqSc8uNCR56JlbbbEI__ICJ8Li72-0sJlD_KWNF28-t6qNs65Z1Vkpfa6HGAKzk7vS04Z4nKHiXLcDyZ0hNyTZKUPlxFNyR5iVeSj5ChH1pD5-UZeapYnkA3Xoivu-Pp5y_JcCJD4ihu6aTEBjCtwbuyAEKGvG1V5eRPc4eU6DguQfEKsHQWsXYFACFsb13mKoeVh-KlWO36rn0lZNlCa0trszwFZVHZ1HnMSwdN473TaiQ-3MrDuIGunE_N-GEItvCUmjihhifU8ISOxPtlh58Lpo5_N_3EAl42Y4rteKMPx2awWKMwwwrKOkOdqVanUHkCp1ntmXOrdelIbJN6mBM3i_35etybk2AIiOwZ5rVXmr60E3XifyMy4-khJREq1Zv37vFarOVcaBNrbN6I1Xk4b9-KR-5iPjsLW3GRYStaxW_TmxGS
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELagIAEHKFDEQgsW4sAlNA8ncY5QbdUV2xzQIvVmTexMtX0kyF2KeuMn8Bv5Jcx401WLVCEkTpEcO4k8z88ZfxbirVYKNHn-yOauiRRhiAgSl0ZQZIhxpWOFgTJ_Wta1Pjioru6FWfJDrBbc2DKCv2YD5wVptnJFYYmluPDzI0J4hH_4d9ptcUcVlL_zrpJJvQJd_COQQRfpbVSoIlvS-_Ajtv94wLXIFAj8Kd50Hq-nrSHu7D76H1-8Lh4OWaf8sFSTx-JW2z0RD65wET4V59P-uwRKIWUoavv14-dQunXKm6skr7bRbQ8Xcn56WXPOQpU9ShbjuJ7RHfJOkvTeXwRPJHmVV5KbkL4fekPn5Bk5q1ChQA0b4svueLazFw2HMkSWQpeOcqwA4xKczTMgcMg7V1VKLjW1SLmO5SoUpwBz2yCWNgMgkO0am9jCYuEgeybWur5rnwuZt9A2edMkaQyqQdXE1mGaW6gq56xWI_H-UiDGDozlfHDGiSHkwlNqwoQanlDDEzoS71YDvi7JOm7u-pElvOrGLNuhofeHZjBaozDBAvIyQZ2oVsdQOMKnSemYdqu18Ui8If0wx3YexvP1sDfH3hAWmRimtlea3rQdlOJvX2TGs8-UR6hYv_jnEa_Fvb3Z_tRMJ_Wnl-J-ynU3oeRmU6wt_Ld2S9y154v5mX8VjOM3nSwUzQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEBZtWkpy6Dtk-xSlh17c-CHb8rGPXbp0MaVsITcxljxhm8QOyiYlt_6E_sb-ks5onSUplFLoySBLttE8P3n0SYiXWinQ5Pkjm7smUoQhIkhcGkGRIcaVjhUGyvxZWdd6b6-6vBdmxQ-xXnBjywj-mg28PXbIVq4oLLEUl37xlRAe4R_-nXZd3FAFBUDeVTKt16CLfwQy6CK9jQpVZCt6H37E7m8PuBKZAoE_xZvO49W0NcSdyZ3_8cV3xe0h65RvVmpyT1xru_ti6xIX4QNxNuu_SaAUUoaitp_ffwylW0e8uUryahvd9nAuF0cXNecsVNmjZDGO6zndIe8kSe_9efBEkld5JbkJ6fuhN3ROnpCzChUK1PBQfJmM5-8-RMOhDJGl0KWjHCvAuARn8wwIHPLOVZWSS00tUq5juQrFKcDcNoilzQAIZLvGJrawWDjItsVG13ftjpB5C22TN02SxqAaVE1sHaa5hapyzmo1Eq8vBGLswFjOB2ccGkIuPKUmTKjhCTU8oSPxaj3geEXW8eeub1nC627Msh0aer9vBqM1ChMsIC8T1IlqdQyFI3yalI5pt1obj8QL0g9zYBdhPF_3e3PgDWGRqWFqe6XpTbtBKf72RWY8_0x5hIr1o38e8Vzc-vR-YmbT-uNjsZly2U2ouHkiNpb-tH0qbtqz5eLEPwu28QvurRQ_
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Low+area+field%E2%80%90programmable+gate+array+implementation+of+PRESENT+image+encryption+with+key+rotation+and+substitution&rft.jtitle=ETRI+journal&rft.au=Parikibandla%2C+Srikanth&rft.au=Alluri%2C+Sreenivas&rft.date=2021-12-01&rft.issn=1225-6463&rft.eissn=2233-7326&rft.volume=43&rft.issue=6&rft.spage=1113&rft.epage=1129&rft_id=info:doi/10.4218%2Fetrij.2020-0203&rft.externalDBID=n%2Fa&rft.externalDocID=10_4218_etrij_2020_0203
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1225-6463&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1225-6463&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1225-6463&client=summon