Skip Content
You are currently on the new version of our website. Access the old version .

309 Results Found

  • Article
  • Open Access
49 Citations
4,288 Views
22 Pages

A Dynamic DNA Color Image Encryption Method Based on SHA-512

  • Shihua Zhou,
  • Pinyan He and
  • Nikola Kasabov

28 September 2020

This paper presents a dynamic deoxyribonucleic acid (DNA) image encryption based on Secure Hash Algorithm-512 (SHA-512), having the structure of two rounds of permutation–diffusion, by employing two chaotic systems, dynamic DNA coding, DNA sequ...

  • Article
  • Open Access
44 Citations
4,977 Views
18 Pages

Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos

  • Musheer Ahmad,
  • Eesa Al Solami,
  • Xing-Yuan Wang,
  • M. N. Doja,
  • M. M. Sufyan Beg and
  • Amer Awad Alzaidi

6 July 2018

The issues of identity authentication and privacy protection of individuals in body area network (BAN) systems have raised much concern in past few years. To address the challenges of privacy protection in wireless BAN, an image encryption algorithm...

  • Article
  • Open Access
2 Citations
1,689 Views
15 Pages

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices

  • Iain Baird,
  • Isam Wadhaj,
  • Baraq Ghaleb,
  • Craig Thomson and
  • Gordon Russell

11 July 2025

The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3...

  • Article
  • Open Access
4,942 Views
20 Pages

22 July 2025

Rainbow table attacks utilize a time-memory trade-off to efficiently crack passwords by employing precomputed tables containing chains of passwords and hash values. Generating these tables is computationally intensive, and several researchers have pr...

  • Communication
  • Open Access
45 Citations
6,018 Views
13 Pages

Comparison of Anti-Viral Activity of Frog Skin Anti-Microbial Peptides Temporin-Sha and [K3]SHa to LL-37 and Temporin-Tb against Herpes Simplex Virus Type 1

  • Maëva Roy,
  • Lucie Lebeau,
  • Céline Chessa,
  • Alexia Damour,
  • Ali Ladram,
  • Bruno Oury,
  • David Boutolleau,
  • Charles Bodet and
  • Nicolas Lévêque

18 January 2019

Temporins are anti-microbial peptides synthesized in the skin of frogs of the Ranidae family. The few studies to date that have examined their anti-viral properties have shown that they have potential as anti-viral therapies. In this work, we evaluat...

  • Review
  • Open Access
7 Citations
9,949 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Communication
  • Open Access
6 Citations
7,529 Views
9 Pages

19 October 2021

Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an im...

  • Article
  • Open Access
4 Citations
4,354 Views
20 Pages

13 April 2021

Since the Keccak algorithm was selected by the US National Institute of Standards and Technology (NIST) as the standard SHA-3 hash algorithm for replacing the currently used SHA-2 algorithm in 2015, various optimization methods have been studied in p...

  • Article
  • Open Access
15 Citations
6,213 Views
23 Pages

Temporin-SHa and Its Analogs as Potential Candidates for the Treatment of Helicobacter pylori

  • Hamza Olleik,
  • Elias Baydoun,
  • Josette Perrier,
  • Akram Hijazi,
  • Josette Raymond,
  • Marine Manzoni,
  • Lucas Dupuis,
  • Ghislain Pauleau,
  • Yvain Goudard and
  • Marc Maresca
  • + 9 authors

11 October 2019

Helicobacterpylori is one of the most prevalent pathogens colonizing 50% of the world’s population and causing gastritis and gastric cancer. Even with triple and quadruple antibiotic therapies, H. pylori shows increased prevalence of resistance to co...

  • Article
  • Open Access
7 Citations
3,343 Views
20 Pages

Design, Synthesis and Characterization of [G10a]-Temporin SHa Dendrimers as Dual Inhibitors of Cancer and Pathogenic Microbes

  • Arif Iftikhar Khan,
  • Shahzad Nazir,
  • Aaqib Ullah,
  • Muhammad Nadeem ul Haque,
  • Rukesh Maharjan,
  • Shabana U. Simjee,
  • Hamza Olleik,
  • Elise Courvoisier-Dezord,
  • Marc Maresca and
  • Farzana Shaheen

As the technologies for peptide synthesis and development continue to mature, antimicrobial peptides (AMPs) are being widely studied as significant contributors in medicinal chemistry research. Furthermore, the advancement in the synthesis of dendrim...

  • Article
  • Open Access
5 Citations
13,227 Views
16 Pages

Custom ASIC Design for SHA-256 Using Open-Source Tools

  • Lucas Daudt Franck,
  • Gabriel Augusto Ginja,
  • João Paulo Carmo,
  • José A. Afonso and
  • Maximiliam Luppe

25 December 2023

The growth of digital communications has driven the development of numerous cryptographic methods for secure data transfer and storage. The SHA-256 algorithm is a cryptographic hash function widely used for validating data authenticity, identity, and...

  • Article
  • Open Access
9 Citations
3,247 Views
15 Pages

Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted...

  • Article
  • Open Access
4 Citations
2,450 Views
16 Pages

Synthesis of Second-Generation Analogs of Temporin-SHa Peptide Having Broad-Spectrum Antibacterial and Anticancer Effects

  • Arif Iftikhar Khan,
  • Shahzad Nazir,
  • Muhammad Nadeem ul Haque,
  • Rukesh Maharjan,
  • Farooq-Ahmad Khan,
  • Hamza Olleik,
  • Elise Courvoisier-Dezord,
  • Marc Maresca and
  • Farzana Shaheen

Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against...

  • Article
  • Open Access
348 Views
28 Pages

21 December 2025

As the demand for secure communication and data integrity in embedded and networked systems continues to grow, there is an increasing need for cryptographic solutions that provide robust security while efficiently using energy and hardware resources....

  • Article
  • Open Access
14 Citations
5,733 Views
25 Pages

SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context

  • Carlos E. B. Santos,
  • Lucileide M. D. da Silva,
  • Matheus F. Torquato,
  • Sérgio N. Silva and
  • Marcelo A. C. Fernandes

17 June 2024

This work proposes an implementation of the SHA-256, the most common blockchain hash algorithm, on a field-programmable gate array (FPGA) to improve processing capacity and power saving in Internet of Things (IoT) devices to solve security and privac...

  • Article
  • Open Access
11 Citations
3,527 Views
14 Pages

10 March 2023

To build a secure cryptography system in the post-quantum era, one must find the minimum security parameters against quantum attacks by estimating the quantum resources of a fault-tolerant quantum computer. In a fault-tolerant quantum computer, error...

  • Article
  • Open Access
4 Citations
5,195 Views
12 Pages

The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptograph...

  • Article
  • Open Access
6 Citations
3,909 Views
29 Pages

An SHA-3 Hardware Architecture against Failures Based on Hamming Codes and Triple Modular Redundancy

  • Alan Torres-Alvarado,
  • Luis Alberto Morales-Rosales,
  • Ignacio Algredo-Badillo,
  • Francisco López-Huerta,
  • Mariana Lobato-Báez and
  • Juan Carlos López-Pimentel

13 April 2022

Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4.0 (Industry 4.0), and automotive applications. Some fundamental characteristics required for th...

  • Article
  • Open Access
119 Citations
10,357 Views
18 Pages

19 September 2018

In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architec...

  • Article
  • Open Access
8 Citations
4,970 Views
23 Pages

A SHA-256 Hybrid-Redundancy Hardware Architecture for Detecting and Correcting Errors

  • Ignacio Algredo-Badillo,
  • Miguel Morales-Sandoval,
  • Alejandro Medina-Santiago,
  • Carlos Arturo Hernández-Gracidas,
  • Mariana Lobato-Baez and
  • Luis Alberto Morales-Rosales

3 July 2022

In emergent technologies, data integrity is critical for message-passing communications, where security measures and validations must be considered to prevent the entrance of invalid data, detect errors in transmissions, and prevent data loss. The SH...

  • Article
  • Open Access
7 Citations
2,782 Views
15 Pages

Pore Structure and Fractal Characteristics of Continental Low Maturity Organic-Rich Shale in the Sha-4 Member of the Liaohe Western Depression

  • Yinglin Liu,
  • Lei Zhang,
  • Xuejuan Zhang,
  • Xin He,
  • Jinpeng Li,
  • Yabing Xing,
  • Fuxin Jin and
  • Yiran Wang

28 December 2022

The research on pore structure and heterogeneity of shale reservoirs has always been a hotspot in the study of unconventional reservoir characteristics. China is a country dominated by continental shale. Compared with marine shale, continental shale...

  • Article
  • Open Access
19 Citations
3,345 Views
16 Pages

Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm

  • Mohan Debarchan Mohanty,
  • Abhishek Das,
  • Mihir Narayan Mohanty,
  • Ayman Altameem,
  • Soumya Ranjan Nayak,
  • Abdul Khader Jilani Saudagar and
  • Ramesh Chandra Poonia

Background: The modern era of human society has seen the rise of a different variety of diseases. The mortality rate, therefore, increases without adequate care which consequently causes wealth loss. It has become a priority of humans to take care of...

  • Article
  • Open Access
17 Citations
4,483 Views
19 Pages

24 February 2019

Proliferation of resistant bacteria on biomaterials is a major problem leading to nosocomial infections. Due to their broad-spectrum activity and their ability to disrupt bacterial membranes through a rapid membranolytic mechanism, antimicrobial pept...

  • Article
  • Open Access
2 Citations
1,616 Views
22 Pages

Synthesis of Temporin-SHa Retro Analogs with Lysine Addition/Substitution and Antibiotic Conjugation to Enhance Antibacterial, Antifungal, and Anticancer Activities

  • Shahzad Nazir,
  • Arif Iftikhar Khan,
  • Rukesh Maharjan,
  • Sadiq Noor Khan,
  • Muhammad Adnan Akram,
  • Marc Maresca,
  • Farooq-Ahmad Khan and
  • Farzana Shaheen

13 December 2024

In the face of rising the threat of resistant pathogens, antimicrobial peptides (AMPs) offer a viable alternative to the current challenge due to their broad-spectrum activity. This study focuses on enhancing the efficacy of temporin-SHa derived NST-...

  • Article
  • Open Access
2 Citations
3,552 Views
19 Pages

Comparison of Hash Functions for Network Traffic Acquisition Using a Hardware-Accelerated Probe

  • Mateusz Korona,
  • Paweł Szumełda,
  • Mariusz Rawski and
  • Artur Janicki

In this article we address the problem of efficient and secure monitoring of computer network traffic. We proposed, implemented, and tested a hardware-accelerated implementation of a network probe, using the DE5-Net FPGA development platform. We show...

  • Article
  • Open Access
925 Views
19 Pages

Integrating Microbial Source Tracking to Unravel Impacts of Wastewater Discharge on Spatial Distribution of Riverine Microbial Community

  • Yanru Fan,
  • Hongbin Gao,
  • Zhongfeng Jiang,
  • Yuran Lv,
  • Xiang Guo,
  • Xinfeng Zhu,
  • Junfeng Wu,
  • Yizhe Li,
  • Wenxiang Yu and
  • Keyu Yuan
  • + 1 author

17 September 2025

Microbial communities play a pivotal role in material cycling, energy flow, and pollutant degradation within river ecosystems. Thus, gaining a clear understanding of how wastewater discharge affects microbial community structure and function is essen...

  • Article
  • Open Access
18 Citations
7,921 Views
14 Pages

Presently, cryptographic hash functions play a critical role in many applications, such as digital signature systems, security communications, protocols, and network security infrastructures. The new standard cryptographic hash function is Secure Has...

  • Article
  • Open Access
14 Citations
5,208 Views
15 Pages

28 August 2023

Hash functions are an essential mechanism in today’s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, inclu...

  • Review
  • Open Access
7 Citations
4,211 Views
16 Pages

Sandwich Hybridization Assay for In Situ Real-Time Cyanobacterial Detection and Monitoring: A Review

  • Ping Gong,
  • Anna K. Antrim,
  • Sarah R. Bickman,
  • Emily G. Cooley and
  • Seung Ho Chung

14 August 2022

As cyanobacterial harmful algal bloom (cHAB) events increase in scale, severity, frequency, and duration around the world, rapid and accurate monitoring and characterization tools have become critically essential for regulatory and management decisio...

  • Article
  • Open Access
6 Citations
2,042 Views
21 Pages

On a Symmetric Image Cryptosystem Based on a Novel One-Dimensional Chaotic System and Banyan Network

  • Qingye Huang,
  • Linqing Huang,
  • Shuting Cai,
  • Xiaoming Xiong and
  • Hui Zhang

24 October 2023

In this paper, a Banyan network with high parallelism and nonlinearity is used for the first time in image encryption to ensure high complexity and randomness in a cipher image. To begin, we propose a new 1-D chaotic system (1-DSCM) which improves th...

  • Article
  • Open Access
18 Citations
3,330 Views
19 Pages

19 October 2021

The accelerated flow of resources and the population has resulted in the coexistence of the expansion and shrinkage of cities. The shrinking city is not a new thing, but it is a new problem that needs to be solved urgently in China. Urban resources r...

  • Article
  • Open Access
6 Citations
3,209 Views
15 Pages

Secure Medical Blockchain Model

  • Ibrahim Shawky Farahat,
  • Waleed Aladrousy,
  • Mohamed Elhoseny,
  • Samir Elmougy and
  • Ahmed Elsaid Tolba

30 January 2023

The Internet of Medical Things (IoMT) uses wireless networks to help patients to communicate with healthcare professionals. Therefore, IoMT devices suffer from a lack of security controls, just like many Internet of Things (IoT) gadgets. Thus, in thi...

  • Article
  • Open Access
6 Citations
2,642 Views
16 Pages

Constitutive Law Identification and Fatigue Characterization of Rigid PUR Elastomers 80 ShA and 90 ShA

  • Krzysztof Junik,
  • Grzegorz Lesiuk,
  • Szymon Duda,
  • Krzysztof Jamroziak,
  • Wojciech Błażejewski,
  • Paweł Zielonka,
  • Tomasz Socha,
  • Arkadiusz Denisiewicz,
  • Krzysztof Kula and
  • Anna Szczurek

28 September 2022

This paper presents the results of a study of polyurethane rigid (PUR) elastomers in terms of the constitutive law identification, and analyses the effect of polyurethane elastomers’ hardness on fatigue properties. The research objects were PUR...

  • Article
  • Open Access
31 Citations
7,970 Views
13 Pages

Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm

  • Luca Baldanzi,
  • Luca Crocetti,
  • Francesco Falaschi ,
  • Matteo Bertolucci,
  • Jacopo Belli,
  • Luca Fanucci and
  • Sergio Saponara

27 March 2020

In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between the different sub-systems of the vehicle. Ran...

  • Article
  • Open Access
35 Citations
9,507 Views
22 Pages

The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios

  • Arun Rana,
  • Sharad Sharma,
  • Kashif Nisar,
  • Ag. Asri Ag. Ibrahim,
  • Sachin Dhawan,
  • Bhawani Chowdhry,
  • Samreen Hussain and
  • Nitin Goyal

30 July 2022

Most Internet of Things (IoT) resources are exposed to security risks due to their essential functionality. IoT devices, such as smartphones and tablets, have a limited network, computation, and storage capacity, making them more vulnerable to attack...

  • Article
  • Open Access
2,442 Views
12 Pages

A 16-bit 125 MS/s pipelined analog-to-digital converter (ADC) implemented in a 0.18 μm CMOS process is presented in this paper. A sample-and-hold amplifier-less (SHA-less) modified 2.5-bit front-end is adopted, which splits the sampling capacitor...

  • Article
  • Open Access
4 Citations
2,459 Views
21 Pages

Antibiofilm Activity and Biocompatibility of Temporin-SHa: A Promising Antimicrobial Peptide for Control of Fluconazole-Resistant Candida albicans

  • Luana Mendonça Dias,
  • Eduardo Maffud Cilli,
  • Karine Sousa Medeiros,
  • Maria Carolina Oliveira de Arruda Brasil,
  • Lina Maria Marin,
  • Walter L. Siqueira and
  • Ana Claudia Pavarina

The aim of the study was to investigate the effect of antimicrobial peptides (AMPs) Hylin−a1, KR−12-a5, and Temporin-SHa in Candida albicans as well as the biocompatibility of keratinocytes spontaneously immortalized (NOK-si) and human gi...

  • Article
  • Open Access
1 Citations
1,617 Views
22 Pages

A Privacy-Enhancing Image Encryption Algorithm for Securing Medical Images

  • Ammar Odeh,
  • Anas Abu Taleb,
  • Tareq Alhajahjeh,
  • Francisco Navarro,
  • Aladdin Ayesh and
  • Miad Faezipour

6 September 2025

The growing digitization of healthcare has amplified concerns about the privacy and security of medical images, as conventional encryption methods often fail to provide sufficient protection. To address this gap, we propose a privacy-enhancing image...

  • Article
  • Open Access
68 Citations
4,723 Views
28 Pages

17 February 2022

A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensi...

  • Article
  • Open Access
4 Citations
3,248 Views
23 Pages

A Versatile Macromer-Based Glycosaminoglycan (sHA3) Decorated Biomaterial for Pro-Osteogenic Scavenging of Wnt Antagonists

  • Mathis Gronbach,
  • Franziska Mitrach,
  • Stephanie Möller,
  • Sandra Rother,
  • Sabrina Friebe,
  • Stefan G. Mayr,
  • Matthias Schnabelrauch,
  • Vera Hintze,
  • Michael C. Hacker and
  • Michaela Schulz-Siegmund

High serum levels of Wnt antagonists are known to be involved in delayed bone defect healing. Pharmaceutically active implant materials that can modulate the micromilieu of bone defects with regard to Wnt antagonists are therefore considered promisin...

  • Article
  • Open Access
10 Citations
2,348 Views
22 Pages

A Dynamic Hybrid Cryptosystem Using Chaos and Diffie–Hellman Protocol: An Image Encryption Application

  • Rolando Flores-Carapia,
  • Víctor Manuel Silva-García and
  • Manuel Alejandro Cardona-López

15 June 2023

Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key safely. For this reason, we propose a dynamic hybrid cryptosystem, which...

  • Article
  • Open Access
5 Citations
1,120 Views
20 Pages

A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding

  • Linqing Huang,
  • Qingye Huang,
  • Han Chen,
  • Shuting Cai,
  • Xiaoming Xiong and
  • Jian Yang

10 May 2025

Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data int...

  • Article
  • Open Access
2 Citations
1,741 Views
22 Pages

This study investigated specific winemaking procedures that could increase fermentation esters and volatile thiols in Chardonnay wine during fermentation. These compounds together are known to cause tropical fruit aromas. Two levels of pre-fermentati...

  • Article
  • Open Access
29 Citations
2,725 Views
15 Pages

Antimicrobial and Safety Properties of Lactobacilli Isolated from two Cameroonian Traditional Fermented Foods

  • Pierre Marie KAKTCHAM,
  • Ngoufack François ZAMBOU,
  • Félicité Mbiapo TCHOUANGUEP,
  • Morsi EL-SODA and
  • Muhammad Iqbal CHOUDHARY

18 December 2011

Twenty-one Lactobacillus isolates from “Sha’a” (a maize – based fermented beverage) and “Kossam” (traditionally fermented cow milk) were selected in accordance with their antagonistic activities and tested for their bacterio-cinogenic potential as we...

  • Article
  • Open Access
15 Citations
5,952 Views
28 Pages

Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD

  • Khushbu Khalid Butt,
  • Guohui Li,
  • Sajid Khan and
  • Sohaib Manzoor

16 January 2020

Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of...

  • Article
  • Open Access
97 Citations
5,929 Views
14 Pages

28 March 2019

The paper proposes a lossless quantum image encryption scheme based on substitution tables (S-box) scrambling, mutation operation and general Arnold transform with keys. First, the key generator builds upon the foundation of SHA-256 hash with plain-i...

  • Article
  • Open Access
10 Citations
3,150 Views
11 Pages

23 November 2021

Lower gastrointestinal bleeding (LGIB) is a frequent cause of emergency department (ED) consultation, leading to investigations but rarely to urgent therapeutic interventions. The SHA2PE score aims to predict the risk of hospital-based intervention,...

  • Article
  • Open Access
50 Citations
4,321 Views
23 Pages

A New 4D Hyperchaotic System with Dynamics Analysis, Synchronization, and Application to Image Encryption

  • Tsafack Nestor,
  • Akram Belazi,
  • Bassem Abd-El-Atty,
  • Md Nazish Aslam,
  • Christos Volos,
  • Nkapkop Jean De Dieu and
  • Ahmed A. Abd El-Latif

21 February 2022

In this paper, a new 4D hyperchaotic nonlinear dynamical system with two positive Lyapunov exponents is presented. Exhaustive dynamic analyses of the novel hyperchaotic model using several dynamical studies are described. The dynamics of the system c...

  • Article
  • Open Access
33 Citations
3,951 Views
18 Pages

AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System

  • Aparna Kumari,
  • Rushil Kaushikkumar Patel,
  • Urvi Chintukumar Sukharamwala,
  • Sudeep Tanwar,
  • Maria Simona Raboaca,
  • Aldosary Saad and
  • Amr Tolba

10 August 2022

The existing grid infrastructure has already begun transforming into the next-generation cyber-physical smart grid (SG) system. This transformation has improved the grid’s reliability and efficiency but has exposed severe vulnerabilities due to...

  • Article
  • Open Access
2 Citations
3,072 Views
18 Pages

The Design of a Low-Power Pipelined ADC for IoT Applications

  • Junkai Zhang,
  • Tao Sun,
  • Zunkai Huang,
  • Wei Tao,
  • Ning Wang,
  • Li Tian,
  • Yongxin Zhu and
  • Hui Wang

22 February 2025

This paper proposes a low-power 10-bit 20 MS/s pipelined analog-to-digital converter (ADC) designed for the burgeoning needs of low-data-rate communication systems, particularly within the Internet of Things (IoT) domain. To reduce power usage, multi...

of 7