Performance-efficient flexible architecture of m–Crypton cipher for resource-constrained applications

Some traditional cryptographic techniques, like the Secure Hash Algorithm (SHA-256 for hashing), Rivest-Shamir-Adleman (RSA/Elliptic Curve for signing) and Advanced Encryption Standard (AES for encryption), perform well on systems with good hardware memory and processing capabilities. However, these...

Full description

Saved in:
Bibliographic Details
Main Authors: Pulkit Singh, S. V. S. Prasad, Shipra Upadhyay, Rajan Singh
Format: Article
Language:English
Published: Taylor & Francis Group 2024-10-01
Series:Automatika
Subjects:
Online Access:https://www.tandfonline.com/doi/10.1080/00051144.2024.2395617
Tags: Add Tag
No Tags, Be the first to tag this record!