2022 International Conference on Computer Science and Software Engineering (CSASE) 2022
DOI: 10.1109/csase51777.2022.9759828
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…This review examines the performance metrics, benefits, and limitations of symmetric key and public-key ciphers. Salman et al [23] conduct a thorough analysis of the AES with customized modifications designed for IoT applications. This paper investigates the modifications to the circular processes of the AES, with a specific emphasis on the shift rows and mixed columns transformations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This review examines the performance metrics, benefits, and limitations of symmetric key and public-key ciphers. Salman et al [23] conduct a thorough analysis of the AES with customized modifications designed for IoT applications. This paper investigates the modifications to the circular processes of the AES, with a specific emphasis on the shift rows and mixed columns transformations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A document's histogram graphically shows the character frequency distribution in a relevant window for a certain document [49][50]. The histogram's x-axis contains all characters within a specific character set: In a content window, the character set.…”
Section: Histogram Analysismentioning
confidence: 99%
“…From Table IV, you can obviously see that this protocol communication cost is the best compared to the other protocols. In terms of computation costs, the following notations are used: T EPM denotes the time cost of one point multiplication computation on ECC, T h denotes the time cost of one hash function computation and T AES denotes the time cost of one AES encryption/decryption operation [37]. Note that T AES requires much less time compared to T EPM [38].…”
Section: Performance Comparisonmentioning
confidence: 99%