Zobrazeno 1 - 10
of 20
pro vyhledávání: '"K K Soundra Pandian"'
Autor:
Ojas Vishwakarma, Sonali Agarwal, K K Soundra Pandian, Mohammad Syafrullah, Krisna Adiyarta, Sanjay Kumar Sonbhadra
Publikováno v:
2022 9th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
Publikováno v:
IEEE Communications Letters. 24:1173-1177
The use of feedback and feedforward functions in the construction of binary machines to generate a given finite or periodic sequence allows us to minimize the expected circuit-size. Using these functions a Register with Non-linear Update (RNLUs) is c
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030767754
Security and efficiency for resource constrained devices using lightweight cryptography techniques is still a problem. It is important to make these devices secure from the intruders and communicate with them securely. Elliptic Curve Cryptography (EC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cf114184056712269844754c60ad3d68
https://doi.org/10.1007/978-3-030-76776-1_13
https://doi.org/10.1007/978-3-030-76776-1_13
Publikováno v:
AsianHOST
Scan-based Design for Testability (DfT) provides high fault coverage, observability, and testability of internal nodes of the chip. It can serve as a medium for the attacker to launch a side-channel attack and thus reveal the secret key embedded in t
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811548246
SSCC
SSCC
The need of providing secret image sharing allows us protecting the information in terms of data integrity, confidentiality and authenticity, which has become obvious in the past few years. However, in the construction of secret image sharing schemes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bdb43d4a2522d9165d6c09d3cc9399dd
https://doi.org/10.1007/978-981-15-4825-3_21
https://doi.org/10.1007/978-981-15-4825-3_21
Publikováno v:
Multimedia Tools and Applications. 78:10837-10863
This paper proposes an efficient (k, n)-Hybrid image sharing scheme (HISS) using non-recursive hash key based stream cipher. The sequence generated using non-linear based boolean function is used to construct the Toeplitz matrix to generate the non-r
Publikováno v:
International Journal of Computers and Applications. 39:45-56
In this paper, a new algorithm along with its first order hardware architecture is proposed to build the pseudorandom non-recursive binary sequence using sequence folding technique to protect the confidential information and data integrity in cryptog
Publikováno v:
Applications and Techniques in Information Security ISBN: 9789811508707
ATIS
ATIS
The need of an hour is the research on design and impacts of Hardware Trojan Horse in a crypto module to serve the purpose of secret key recovery. SIMON is a light weight block cipher that indulges to optimally work with hardware environment. Few pap
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::868f4c4aa79100f9b11980d461b5d12a
https://doi.org/10.1007/978-981-15-0871-4_19
https://doi.org/10.1007/978-981-15-0871-4_19
Publikováno v:
Expert Systems with Applications. 164:114047
In this paper, an alternative public-key cryptosystems (PKCs) are proposed based on the new algebraic problems namely “Dependent RSA Discrete Logarithm Problems” derived from the RSA and Discrete Logarithm (DLog) assumptions together. These PKCs
Autor:
Hoda AlKhzaimi, Bhupendra Gupta, K. K. Soundra Pandian, Shailendra Kumar Tripathi, Sai Badiya
Publikováno v:
Optik. 224:165658
The need for secret sharing using meaningful shadow images is an important method to protect the transmitted data that does not attract the attention of adversary, which has become obvious in the past few years. The recovery of the cover image withou