Skip Content
You are currently on the new version of our website. Access the old version .

18 Results Found

  • Article
  • Open Access
81 Citations
11,981 Views
22 Pages

A Low Area High Speed FPGA Implementation of AES Architecture for Cryptography Application

  • Thanikodi Manoj Kumar,
  • Kasarla Satish Reddy,
  • Stefano Rinaldi,
  • Bidare Divakarachari Parameshachari and
  • Kavitha Arunachalam

21 August 2021

Nowadays, a huge amount of digital data is frequently changed among different embedded devices over wireless communication technologies. Data security is considered an important parameter for avoiding information loss and preventing cyber-crimes. Thi...

  • Article
  • Open Access
5 Citations
955 Views
32 Pages

11 August 2025

With the growing demand for secure image communication, effective encryption solutions are critical for safeguarding visual data from unauthorized access. The substitution box (S-box) in AES (Advanced Encryption Standard) is critical for ensuring non...

  • Article
  • Open Access
7,011 Views
22 Pages

In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool. Our results show that Template Attacks can reco...

  • Article
  • Open Access
123 Citations
7,227 Views
17 Pages

S-Box Based Image Encryption Application Using a Chaotic System without Equilibrium

  • Xiong Wang,
  • Ünal Çavuşoğlu,
  • Sezgin Kacar,
  • Akif Akgul,
  • Viet-Thanh Pham,
  • Sajad Jafari,
  • Fawaz E. Alsaadi and
  • Xuan Quynh Nguyen

22 February 2019

Chaotic systems without equilibrium are of interest because they are the systems with hidden attractors. A nonequilibrium system with chaos is introduced in this work. Chaotic behavior of the system is verified by phase portraits, Lyapunov exponents,...

  • Article
  • Open Access
57 Citations
15,774 Views
16 Pages

Modified Advanced Encryption Standard Algorithm for Information Security

  • Oluwakemi Christiana Abikoye,
  • Ahmad Dokoro Haruna,
  • Abdullahi Abubakar,
  • Noah Oluwatobi Akande and
  • Emmanuel Oluwatobi Asani

5 December 2019

The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that were aimed at securing information while using AES is still bei...

  • Article
  • Open Access
14 Citations
7,292 Views
14 Pages

PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers

  • Kyungho Kim,
  • Seungju Choi,
  • Hyeokdong Kwon,
  • Hyunjun Kim,
  • Zhe Liu and
  • Hwajeong Seo

30 April 2020

An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter...

  • Article
  • Open Access
1 Citations
3,178 Views
17 Pages

14 May 2020

The major factors that determine the performance of the second-order correlation power analysis (SOCPA) include the accuracy of the power model and the correlation between the hypothetical intermediate value and preprocessed power consumption. Becaus...

  • Article
  • Open Access
7 Citations
3,446 Views
14 Pages

Maintaining Secure Level on Symmetric Encryption under Quantum Attack

  • Hung-Jr Shiu,
  • Chao-Tung Yang,
  • Yun-Ru Tsai,
  • Wei-Chung Lin and
  • Chun-Ming Lai

31 May 2023

Quantum computing is currently being researched in many countries, and if implemented in the near future, it may pose a threat to existing encryption standards. In the quantum computer environment, asymmetric encryption can be solved by Shor’s...

  • Article
  • Open Access
1,577 Views
18 Pages

A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time

  • Xu Yan,
  • Bin Lian,
  • Yunhao Yang,
  • Xiaotie Wang,
  • Jialin Cui,
  • Xianghong Zhao,
  • Fuqun Wang and
  • Kefei Chen

28 May 2024

The secure computation of symmetric encryption schemes using Yao’s garbled circuits, such as AES, allows two parties, where one holds a plaintext block m and the other holds a key k, to compute Enc(k,m) without leaking m and k to one another. D...

  • Article
  • Open Access
12 Citations
3,984 Views
26 Pages

11 January 2022

The Internet of Things (IoT) connects billions of sensors to share and collect data at any time and place. The Advanced Metering Infrastructure (AMI) is one of the most important IoT applications. IoT supports AMI to collect data from smart sensors,...

  • Article
  • Open Access
3 Citations
3,143 Views
17 Pages

5 August 2021

In this paper, we inspect the theoretical problem of counting the number of analogies between sentences contained in a text. Based on this, we measure the analogical density of the text. We focus on analogy at the sentence level, based on the level o...

  • Article
  • Open Access
1,339 Views
20 Pages

Coarse-Fine Tracker: A Robust MOT Framework for Satellite Videos via Tracking Any Point

  • Hanru Shi,
  • Xiaoxuan Liu,
  • Xiyu Qi,
  • Enze Zhu,
  • Jie Jia and
  • Lei Wang

24 June 2025

Traditional Multiple Object Tracking (MOT) methods in satellite videos mostly follow the Detection-Based Tracking (DBT) framework. However, the DBT framework assumes that all objects are correctly recognized and localized by the detector. In practice...

  • Article
  • Open Access
3 Citations
1,662 Views
17 Pages

30 October 2024

To increase bandwidth and overcome packet loss in Wide Area Networks (WANs), per-packet multipath transmission and redundant transmission are increasingly being used as Software-Defined Wide Area Network (SD-WAN) solutions. However, this results in o...

  • Article
  • Open Access
28 Citations
8,253 Views
31 Pages

26 June 2024

Internet of Things (IoT) applications and resources are highly vulnerable to flood attacks, including Distributed Denial of Service (DDoS) attacks. These attacks overwhelm the targeted device with numerous network packets, making its resources inacce...

  • Article
  • Open Access
11 Citations
4,875 Views
12 Pages

Wireless Communication Test on 868 MHz and 2.4 GHz from inside the 18650 Li-Ion Enclosed Metal Shell

  • Vlad Marsic,
  • Tazdin Amietszajew,
  • Petar Igic,
  • Soroush Faramehr and
  • Joe Fleming

2 March 2022

As the RF communication on 18650 Li-ion cell level has not been reported due to its challenges and constrains, in this work, a valid wireless data link is demonstrated in an enclosed empty metal shell at 868 MHz and 2.4 GHz based on the IEEE 802.15.4...

  • Article
  • Open Access
2 Citations
4,042 Views
18 Pages

A Neural-Network-Based Approach to Chinese–Uyghur Organization Name Translation

  • Aishan Wumaier,
  • Cuiyun Xu,
  • Zaokere Kadeer,
  • Wenqi Liu,
  • Yingbo Wang,
  • Xireaili Haierla,
  • Maihemuti Maimaiti,
  • ShengWei Tian and
  • Alimu Saimaiti

21 October 2020

The recognition and translation of organization names (ONs) is challenging due to the complex structures and high variability involved. ONs consist not only of common generic words but also names, rare words, abbreviations and business and industry j...

  • Article
  • Open Access
4 Citations
1,553 Views
19 Pages

With increasing vehicle density and growing demands on transport infrastructure, there is a need for resilient, low-cost communication systems capable of supporting safety-critical applications, especially in situations where primary channels like Wi...

  • Review
  • Open Access
1,539 Views
20 Pages

LPWAN Technologies for IoT: Real-World Deployment Performance and Practical Comparison

  • Dmitrijs Orlovs,
  • Artis Rusins,
  • Valters Skrastiņš and
  • Janis Judvaitis

10 December 2025

Low Power Wide Area Networks (LPWAN) have emerged as essential connectivity solutions for the Internet of Things (IoT), addressing requirements for long range, energy efficient communication that traditional wireless technologies cannot meet. With LP...