Search Results - "Mishra, Zeesha"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    High throughput and low area architectures of secure IoT algorithm for medical image encryption by Mishra, Zeesha, Acharya, Bibhudendra

    “…The favor that lightweight encryption algorithms have gained over the recent years regarding data and image security in a resource constrained environment of…”
    Get full text
    Journal Article
  2. 2

    High throughput compact area architecture of XXTEA for IoT application by Mishra, Zeesha, Acharya, Bibhudendra

    Published in Sadhana (Bangalore) (05-05-2023)
    “…Lightweight cryptography has been one of such fields which is used in resource constrained environments. XXTEA is a popular and efficient lightweight block…”
    Get full text
    Journal Article
  3. 3

    High throughput novel architectures of TEA family for high speed IoT and RFID applications by Mishra, Zeesha, Acharya, Bibhudendra

    “…The current era of ubiquitous computing has led to the emergence of a sub-domain in cryptography called Lightweight Cryptography, which deals with imparting…”
    Get full text
    Journal Article
  4. 4

    High throughput unified architecture of LEA algorithm for image encryption by Mishra, Zeesha, Nath, Pallab Kumar, Acharya, Bibhudendra

    Published in Microprocessors and microsystems (01-10-2020)
    “…Among instances when the data and image security in resource constrained environment (smart devices and the like) are to be taken into consideration,…”
    Get full text
    Journal Article
  5. 5

    Dual‐Stepped Gate Vertical Double‐Diffused Metal‐Oxide‐Semiconductor Field‐Effect Transistor with Enhanced Device Performance by Sidar, Devesh Singh, Parmar, Onika, Mishra, Zeesha

    “…Herein, vertical double‐diffused metal‐oxide‐semiconductor field‐effect transistor(VDMOS) with improved device structure is proposed. Gate engineering is…”
    Get full text
    Journal Article
  6. 6

    Stepped Doped High k VDMOS: Switching Characteristics by Shukla, Shaivya, Parmar, Onika, Rajput, Amit Singh, Mishra, Zeesha

    “…This paper presents the switching analysis of vertical stepped doped high k VDMOS. The introduction of vertical step doping in the n pillar of HK VDMOS brings…”
    Get full text
    Journal Article
  7. 7

    Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications by Raja, Kaluri Praveen, Mishra, Zeesha, Singh, Pulkit, Acharya, Bibhudendra

    Published in Integration (Amsterdam) (01-01-2023)
    “…Due to the vigorous and ever-evolving demands of the IoT field, resource-constrained devices are being deployed in such areas and several new challenges like…”
    Get full text
    Journal Article
  8. 8

    High frequency architecture of SLIM lightweight block cipher for resource-constrained IoT applications by Kumar, Pravin, Mishra, Zeesha, Acharya, Bibhudendra

    “…IoT, RFID and WSN environments are vulnerable to several security attacks. The major concern with these systems is their inability to provide appropriate…”
    Get full text
    Conference Proceeding
  9. 9

    Area optimised implementation of block cipher ELEPHANT for resource constrained devices in cyber physical system by Baurai, Nidhi, Patnaik, Bijayananda, Acharya, Bibhudendra, Mishra, Zeesha

    “…The requirement for secure and effective cryptography methods suitable for the limited resources available in remote access cyber physical system has grown…”
    Get full text
    Conference Proceeding
  10. 10

    Hardware Implementation of Shadow Lightweight Block Cipher for Resource-Constrained IoT Devices by Yadav, Pranjali, Chandrakar, Sanskriti, Mishra, Zeesha, Acharya, Bibhudendra

    “…The development of the Internet of Things has led to a notable increase in the adoption of low-power, multipurpose sensors. Ensuring data security during…”
    Get full text
    Conference Proceeding
  11. 11

    High frequency architecture of lightweight authenticated cipher ELEPHANT -160 for resource-constrained IoT applications by Baurai, Nidhi, Mishra, Zeesha, Patnaik, Bijayananda, Acharya, Bibhudendra

    “…The increasing prevalence of IoT has led to a growing need for cryptographic solutions that are both secure and efficient, capable of operating effectively…”
    Get full text
    Conference Proceeding
  12. 12

    Optimised Architecture of Shadow Lightweight Cipher by Pranav, G Krishna, Mishra, Zeesha, Acharya, Bibhudendra

    “…Due to its expanding user base and range of potential uses, the IoT is often regarded as the next big social revolution. It's impossible to name a single…”
    Get full text
    Conference Proceeding
  13. 13

    A Compact & Low Power Architecture of XXTEA192 Lightweight block cipher by Kella, Chaitanya, Mishra, Zeesha, Acharya, Bibhudendra

    “…RFID and IoT security threats have been increased due to the enormous usage of ubiquitous computing devices. Providing security to RFID tags is one of…”
    Get full text
    Conference Proceeding
  14. 14

    LEA: 128 High Frequency Architecture with Image Analysis by Mishra, Zeesha, Mishra, Shubham, Acharya, Bibhudendra

    “…A High throughput architecture for IoT applications and security is the necessity of today. To secure real time applications, there is a need of fast…”
    Get full text
    Conference Proceeding
  15. 15

    A High Throughput And Speed Architecture of Lightweight Cipher LEA by Mishra, Shubham, Mishra, Zeesha, Acharya, Bibhudendra

    “…A high-speed cryptography algorithm is the necessity of today's world to communicate between two resource-constrained tools. We have proposed a 128-bit block…”
    Get full text
    Conference Proceeding
  16. 16

    IoT based Motor Pump Control System by Kumar, Indrajeet, Mishra, Zeesha, Rajput, Amit Singh, Parmar, Onika

    “…The "Internet of Things", commonly known as "IoT", is the most trending and most demanding technology nowadays, which interconnects physical devices like…”
    Get full text
    Conference Proceeding
  17. 17

    Optimized Hardware Implementation of XXTEA-192 for Resource Constrained Applications by Khute, Neha, Mishra, Zeesha, Rajput, Amit Singh, Parmar, Onika

    “…The wide-spread use of computing devices across the country has increased the risks associated with Radio Frequency Identification (RFID) and Internet of…”
    Get full text
    Conference Proceeding
  18. 18

    Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application by Ramu, Gandu, Mishra, Zeesha, Acharya, B.

    “…The deployment of smart devices in IoT applications are increasing with tremendous pace causing severe security concerns, as it trade most of private…”
    Get full text
    Conference Proceeding