Search Results - "Mishra, Zeesha"
-
1
High throughput and low area architectures of secure IoT algorithm for medical image encryption
Published in Journal of information security and applications (01-08-2020)“…The favor that lightweight encryption algorithms have gained over the recent years regarding data and image security in a resource constrained environment of…”
Get full text
Journal Article -
2
High throughput compact area architecture of XXTEA for IoT application
Published in Sadhana (Bangalore) (05-05-2023)“…Lightweight cryptography has been one of such fields which is used in resource constrained environments. XXTEA is a popular and efficient lightweight block…”
Get full text
Journal Article -
3
High throughput novel architectures of TEA family for high speed IoT and RFID applications
Published in Journal of information security and applications (01-09-2021)“…The current era of ubiquitous computing has led to the emergence of a sub-domain in cryptography called Lightweight Cryptography, which deals with imparting…”
Get full text
Journal Article -
4
High throughput unified architecture of LEA algorithm for image encryption
Published in Microprocessors and microsystems (01-10-2020)“…Among instances when the data and image security in resource constrained environment (smart devices and the like) are to be taken into consideration,…”
Get full text
Journal Article -
5
Dual‐Stepped Gate Vertical Double‐Diffused Metal‐Oxide‐Semiconductor Field‐Effect Transistor with Enhanced Device Performance
Published in Physica status solidi. A, Applications and materials science (01-02-2024)“…Herein, vertical double‐diffused metal‐oxide‐semiconductor field‐effect transistor(VDMOS) with improved device structure is proposed. Gate engineering is…”
Get full text
Journal Article -
6
Stepped Doped High k VDMOS: Switching Characteristics
Published in Physica status solidi. A, Applications and materials science (01-08-2023)“…This paper presents the switching analysis of vertical stepped doped high k VDMOS. The introduction of vertical step doping in the n pillar of HK VDMOS brings…”
Get full text
Journal Article -
7
Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications
Published in Integration (Amsterdam) (01-01-2023)“…Due to the vigorous and ever-evolving demands of the IoT field, resource-constrained devices are being deployed in such areas and several new challenges like…”
Get full text
Journal Article -
8
High frequency architecture of SLIM lightweight block cipher for resource-constrained IoT applications
Published in 2023 International Conference on Microwave, Optical, and Communication Engineering (ICMOCE) (26-05-2023)“…IoT, RFID and WSN environments are vulnerable to several security attacks. The major concern with these systems is their inability to provide appropriate…”
Get full text
Conference Proceeding -
9
Area optimised implementation of block cipher ELEPHANT for resource constrained devices in cyber physical system
Published in 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) (24-06-2024)“…The requirement for secure and effective cryptography methods suitable for the limited resources available in remote access cyber physical system has grown…”
Get full text
Conference Proceeding -
10
Hardware Implementation of Shadow Lightweight Block Cipher for Resource-Constrained IoT Devices
Published in 2024 Third International Conference on Power, Control and Computing Technologies (ICPC2T) (18-01-2024)“…The development of the Internet of Things has led to a notable increase in the adoption of low-power, multipurpose sensors. Ensuring data security during…”
Get full text
Conference Proceeding -
11
High frequency architecture of lightweight authenticated cipher ELEPHANT -160 for resource-constrained IoT applications
Published in 2023 OITS International Conference on Information Technology (OCIT) (13-12-2023)“…The increasing prevalence of IoT has led to a growing need for cryptographic solutions that are both secure and efficient, capable of operating effectively…”
Get full text
Conference Proceeding -
12
Optimised Architecture of Shadow Lightweight Cipher
Published in 2023 4th International Conference for Emerging Technology (INCET) (26-05-2023)“…Due to its expanding user base and range of potential uses, the IoT is often regarded as the next big social revolution. It's impossible to name a single…”
Get full text
Conference Proceeding -
13
A Compact & Low Power Architecture of XXTEA192 Lightweight block cipher
Published in 2021 6th International Conference on Communication and Electronics Systems (ICCES) (08-07-2021)“…RFID and IoT security threats have been increased due to the enormous usage of ubiquitous computing devices. Providing security to RFID tags is one of…”
Get full text
Conference Proceeding -
14
LEA: 128 High Frequency Architecture with Image Analysis
Published in 2020 International Conference for Emerging Technology (INCET) (01-06-2020)“…A High throughput architecture for IoT applications and security is the necessity of today. To secure real time applications, there is a need of fast…”
Get full text
Conference Proceeding -
15
A High Throughput And Speed Architecture of Lightweight Cipher LEA
Published in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (01-10-2019)“…A high-speed cryptography algorithm is the necessity of today's world to communicate between two resource-constrained tools. We have proposed a 128-bit block…”
Get full text
Conference Proceeding -
16
IoT based Motor Pump Control System
Published in 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET) (23-12-2022)“…The "Internet of Things", commonly known as "IoT", is the most trending and most demanding technology nowadays, which interconnects physical devices like…”
Get full text
Conference Proceeding -
17
Optimized Hardware Implementation of XXTEA-192 for Resource Constrained Applications
Published in 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET) (23-12-2022)“…The wide-spread use of computing devices across the country has increased the risks associated with Radio Frequency Identification (RFID) and Internet of…”
Get full text
Conference Proceeding -
18
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Published in 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON) (01-03-2019)“…The deployment of smart devices in IoT applications are increasing with tremendous pace causing severe security concerns, as it trade most of private…”
Get full text
Conference Proceeding