Author:
Saranya K.,Vijeyakumar K. N.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Signal Processing
Reference24 articles.
1. H.D. Azari, P.V. Joshi, An efficient implementation of present cipher model with 80 bit and 128 bit key over FPGA based hardware architecture. Int. J. Pure Appl. Math. 119, 1825–1832 (2018)
2. A.N. Bahar, M.M. Rahman, N.M. Nahid, M.K. Hassan, Energy dissipation dataset for reversible logic gates in quantum dot-cellular automata. Data Brief 10, 557–560 (2017)
3. M.K. Balajee, J.M. Gnanasekar, Evaluation of key dependent S-box based data security algorithm using hamming distance and balanced output. Tem J. 5, 67–75 (2016)
4. A. Balamanikandan, K. Krishnamoorthi, Low area ASIC implementation of LUT–CLA–QTL architecture for cryptography applications. Wireless Netw. 26(1–13), 2681–2693 (2020)
5. G. Bansod, A. Patil, S. Sutar, N. Pisharoty, An ultralightweight encryption design for security in pervasive computing, in Big Data Security on Cloud (BigDataSecurity). IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (2016), pp. 79–84
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献