2019
DOI: 10.1166/jctn.2019.7985
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Approach to Design Key Generator of Cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…One efficient way to achieve this is cryptography, in which various algorithms that vary in their security are proposed. An algorithm of cryptography, which has not yet been found a way to break it, is the AES algorithm [3]. However, the AES algorithm has high computational power to achieve its operations because of the large number of rounds that are used, and the need for more time to encrypt the data [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…One efficient way to achieve this is cryptography, in which various algorithms that vary in their security are proposed. An algorithm of cryptography, which has not yet been found a way to break it, is the AES algorithm [3]. However, the AES algorithm has high computational power to achieve its operations because of the large number of rounds that are used, and the need for more time to encrypt the data [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…There will be a hug exchange of data, including personal data and many data that need to be confidential. So, data security is an important challenge that should be taking a priority work to secure these data by encrypted them [2]. Since, the devices used in IoT are constrained devices (processing, memory, and power) [3], therefore, it is preferable to use encryption systems with lower computational power, less amount of storage in addition to less energy consumption.…”
Section: Introductionmentioning
confidence: 99%