2019
DOI: 10.23919/jcc.2019.06.015
|View full text |Cite
|
Sign up to set email alerts
|

A VLIW architecture stream cryptographic processor for information security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The stream data is transmitted in IoT device via compression using delta encoding as shown in Figure 7. For the encryption, stream cipher is used as stream cipher has fast processing speed in case of limited computing resources as in IoT 25 . In Figure 8, an example is demonstrating the data transmission mechanism in IoT border router, where the dataset with the data elements, that is, 23, 24, 23, and 25 (in decimal) is compressed and encrypted with key streams 010101, 011, 010 and 110.…”
Section: The Proposed Streamed Data Handling Systemmentioning
confidence: 99%
See 3 more Smart Citations
“…The stream data is transmitted in IoT device via compression using delta encoding as shown in Figure 7. For the encryption, stream cipher is used as stream cipher has fast processing speed in case of limited computing resources as in IoT 25 . In Figure 8, an example is demonstrating the data transmission mechanism in IoT border router, where the dataset with the data elements, that is, 23, 24, 23, and 25 (in decimal) is compressed and encrypted with key streams 010101, 011, 010 and 110.…”
Section: The Proposed Streamed Data Handling Systemmentioning
confidence: 99%
“…This way it minimizes energy consumption during the computation and saves the battery life of the IoT devices. Existing research ignored prior information of the compression percentage, however, the proposed approach has taken into account how much compression required for any input dataset. This makes it a user‐centered approach. The proposed model uses stream cipher 25,26 for the encryption and decryption in order to ensure the security during the data transmission from client to server side or vice‐versa. Stream cipher is the faster and more secure technique for light‐weighted IoT devices as it uses simple XOR operation, and it is also reliable for data transmission which is continuous in nature.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In academia, several studies have been conducted on VLIW architecture implementation on application-specific integrated circuit (ASIC) and FPGA technology. An ASICbased four-slot VLIW for multiple stream cipher operations is fabricated on a 180 nm technology to achieve an operating frequency of 200 MHz [5]. It achieves a good tradeoff between high performance and flexibility for multiple basic stream cipher operations.…”
Section: Related Workmentioning
confidence: 99%