A dual dynamic key chaotic encryption system for industrial cyber-physical systems

[1]  Md. Selim Hossain,et al.  FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field , 2019, IEEE Access.

[2]  Qifu Tyler Sun,et al.  A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense , 2018, IEEE Access.

[3]  A B Nasution,et al.  Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB) , 2018 .

[4]  Fang Zhou,et al.  A new method for resisting collision attack based on parallel random delay S-box , 2019, IEICE Electron. Express.

[5]  Hongbo Kang,et al.  FPGA implementation of dynamic key management for DES encryption algorithm , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[6]  Chun-I Fan,et al.  Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices , 2019, IEEE Internet of Things Journal.

[7]  Yicong Zhou,et al.  Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation , 2019, IEEE Transactions on Industrial Electronics.

[8]  Mohammad S. Obaidat,et al.  An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things , 2020, IEEE Systems Journal.

[9]  V. R. Venkatasubramani,et al.  An improved quad Itoh-Tsujii algorithm for FPGAs , 2013, IEICE Electron. Express.

[10]  Reza Azarderakhsh,et al.  Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.

[11]  Muhammad Ikhsan Setiawan,et al.  Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC) , 2018 .

[12]  Yongqiang Lyu,et al.  A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing , 2015, IEEE Transactions on Information Forensics and Security.

[13]  An Wang,et al.  New second-order threshold implementation of AES , 2019, IET Inf. Secur..

[14]  Elaine B. Barker,et al.  Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .

[15]  Chris J. Mitchell,et al.  On the Security of 2-Key Triple DES , 2016, IEEE Transactions on Information Theory.