Abstract- Encryption is becoming an increasingly dominant component in online and mobile applications. While robust security is an important property desired in encryption schemes, it is equally important for such schemes to be highly energy efficient. In this paper we evaluate traditional AES implementations and non-traditional Chaotic Maps based encryption schemes. Our experiments reveal that Chaotic Maps based schemes outperform the traditional AES implementation in terms of CPU usage, encryption speed, and energy consumption. Particularly they consume 300-400 % less CPU, and have over 250 % faster encryption speed. In addition, the energy usage of the Chaotic scheme for a given input rate or size is 3 times better compared to the other ...
Ciphering algorithms play a main role in information security systems. Therefore in this paper we ar...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
This thesis looked at three encryption applications that all use the symmetric encryption algorithms...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc a...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
With the growing prevalence of the Internet of Things, securing the sheer abundance of devices is cr...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
In the modern world today, cryptography has become ubiquitous. It can be found easily on many applic...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
Ciphering algorithms play a main role in information security systems. Therefore in this paper we ar...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
This thesis looked at three encryption applications that all use the symmetric encryption algorithms...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Delays added by the encryption process represent an overhead for smart computing devices in ad-hoc a...
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. C...
This paper runs an evaluation of cryptographic algorithms (block ciphers and public key ciphers) in ...
With the growing prevalence of the Internet of Things, securing the sheer abundance of devices is cr...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications ena...
This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
In the modern world today, cryptography has become ubiquitous. It can be found easily on many applic...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
Ciphering algorithms play a main role in information security systems. Therefore in this paper we ar...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
This thesis looked at three encryption applications that all use the symmetric encryption algorithms...