A dual dynamic key chaotic encryption system for industrial cyber-physical systems
暂无分享,去创建一个
Weiqiang Xu | Shuyun Luo | Chengqun Wang | Guangqiang Qiu | Chengqun Wang | Weiqiang Xu | Shuyun Luo | Guangqiang Qiu
[1] Md. Selim Hossain,et al. FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field , 2019, IEEE Access.
[2] Qifu Tyler Sun,et al. A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense , 2018, IEEE Access.
[3] A B Nasution,et al. Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB) , 2018 .
[4] Fang Zhou,et al. A new method for resisting collision attack based on parallel random delay S-box , 2019, IEICE Electron. Express.
[5] Hongbo Kang,et al. FPGA implementation of dynamic key management for DES encryption algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[6] Chun-I Fan,et al. Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices , 2019, IEEE Internet of Things Journal.
[7] Yicong Zhou,et al. Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation , 2019, IEEE Transactions on Industrial Electronics.
[8] Mohammad S. Obaidat,et al. An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things , 2020, IEEE Systems Journal.
[9] V. R. Venkatasubramani,et al. An improved quad Itoh-Tsujii algorithm for FPGAs , 2013, IEICE Electron. Express.
[10] Reza Azarderakhsh,et al. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[11] Muhammad Ikhsan Setiawan,et al. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC) , 2018 .
[12] Yongqiang Lyu,et al. A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing , 2015, IEEE Transactions on Information Forensics and Security.
[13] An Wang,et al. New second-order threshold implementation of AES , 2019, IET Inf. Secur..
[14] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[15] Chris J. Mitchell,et al. On the Security of 2-Key Triple DES , 2016, IEEE Transactions on Information Theory.