2019
DOI: 10.1080/01611194.2018.1563009
|View full text |Cite
|
Sign up to set email alerts
|

LICID: a lightweight image cryptosystem for IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…In [14], another gray-scale image encryption scheme uses zigzag scanning for obfuscation, one-dimensional chaotic logic mapping for diffusion, and a 128-bit key. In [15], outer-inner structure is proposed to enhance the confusion and diffusion in the outer phase. However, this scheme resists the linear and differential cryptanalysis in the inner phase.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…In [14], another gray-scale image encryption scheme uses zigzag scanning for obfuscation, one-dimensional chaotic logic mapping for diffusion, and a 128-bit key. In [15], outer-inner structure is proposed to enhance the confusion and diffusion in the outer phase. However, this scheme resists the linear and differential cryptanalysis in the inner phase.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Our value, (existing works) Number of rounds 1, (31 [2], 22 [3], 25 [4], 32 [5], 36 [6], 10/12 [7], 32 [29], 2 [13], 14 [15], 2 [16]) Key size (bits) 300, (80/128 [2], 64/72/96/128/192/256 [3], 80/120 [4], 64/72/96/128/144/192/256 [5], 80/128 [6], 80/128 [7], 128 [13], 112 [15], 128/192/256/512 [16], 80 [29]) Block size (bits) 128/256, (64 [2], 32/48/64/128 [3], 64 [4], 32/48/64/92/128 [5], 64 [6], 64 [7], 32/64/128/256 [13], 64 [15], 256 [16], 64 [29],) Input type…”
Section: Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…30 A suitable security mechanism and an encryption algorithm are required to function efficiently within the limitations of the IoT devices, 31 thus requires a lightweight cryptosystem and a intrusion detection and analysis system that have been designed in accordance with the capabilities of the resource-constrained devices. [32][33][34] • Memory restrictions: Buffer overflow is a common form of attack that attempts to overrun the buffer boundaries 35 while processing buffers where data is stored. The attack is a result of the lack of proper inspection of buffers that store data.…”
Section: Security Challenges In Iot Environmentmentioning
confidence: 99%