These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
155 related articles for article (PubMed ID: 33287234)
1. Breaking Trivium Stream Cipher Implemented in ASIC Using Experimental Attacks and DFA. Potestad-Ordóñez FE; Valencia-Barrero M; Baena-Oliva C; Parra-Fernández P; Jiménez-Fernández CJ Sensors (Basel); 2020 Dec; 20(23):. PubMed ID: 33287234 [TBL] [Abstract][Full Text] [Related]
2. Experimental FIA Methodology Using Clock and Control Signal Modifications under Power Supply and Temperature Variations. Potestad-Ordóñez FE; Tena-Sánchez E; Mora-Gutiérrez JM; Valencia-Barrero M; Jiménez-Fernández CJ Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833675 [TBL] [Abstract][Full Text] [Related]
3. On the resistance of new lightweight block ciphers against differential cryptanalysis. Chan YY; Khor CY; Khoo BT; Teh JS; Teng WJ; Jamil N Heliyon; 2023 Apr; 9(4):e15257. PubMed ID: 37095966 [TBL] [Abstract][Full Text] [Related]
4. A practical key recovery attack on the lightweight WG-5 stream cipher. Ding L; Liao Z; Li Z; Wu Z; Wang X; Guan Z Heliyon; 2024 Jan; 10(2):e24197. PubMed ID: 38268835 [TBL] [Abstract][Full Text] [Related]
5. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices. Lara E; Aguilar L; García JA; Sanchez MA Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774 [TBL] [Abstract][Full Text] [Related]
6. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments. Amin Ghafari V; Hu H Entropy (Basel); 2018 Mar; 20(3):. PubMed ID: 33265271 [TBL] [Abstract][Full Text] [Related]
7. Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study. Abu-Tair M; Djahel S; Perry P; Scotney B; Zia U; Carracedo JM; Sajjad A Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33126629 [TBL] [Abstract][Full Text] [Related]
8. Design and Analysis of Area and Energy Efficient Reconfigurable Cryptographic Accelerator for Securing IoT Devices. Zhang X; Liu B; Zhao Y; Hu X; Shen Z; Zheng Z; Liu Z; Chong KS; Yu G; Wang C; Zou X Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501862 [TBL] [Abstract][Full Text] [Related]
12. Quantum exhaustive key search with simplified-DES as a case study. Almazrooie M; Samsudin A; Abdullah R; Mutter KN Springerplus; 2016; 5(1):1494. PubMed ID: 27652067 [TBL] [Abstract][Full Text] [Related]
13. Application of a MEMS-Based TRNG in a Chaotic Stream Cipher. Garcia-Bosque M; Pérez A; Sánchez-Azqueta C; Celma S Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335579 [TBL] [Abstract][Full Text] [Related]
14. Enhancing Sensor Network Security with Improved Internal Hardware Design. Wang W; Deng Z; Wang J Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013741 [TBL] [Abstract][Full Text] [Related]
15. Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis. Fang X; Zhang H; Cui X; Wang Y; Ding L Entropy (Basel); 2023 Jun; 25(6):. PubMed ID: 37372252 [TBL] [Abstract][Full Text] [Related]
16. Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. Chuah CW; Harun NZ; Hamid IRA PeerJ Comput Sci; 2024; 10():e2249. PubMed ID: 39314715 [TBL] [Abstract][Full Text] [Related]
17. FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. Abed S; Jaffal R; Mohd BJ; Alshayeji M Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30795605 [TBL] [Abstract][Full Text] [Related]
18. An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults. Dong L; Zhang H; Sun S; Zhu L; Cui X; Ghosh BK Sensors (Basel); 2020 Apr; 20(7):. PubMed ID: 32244774 [TBL] [Abstract][Full Text] [Related]
19. Clock Frequency Impact on the Performance of High-Security Cryptographic Cipher Suites for Energy-Efficient Resource-Constrained IoT Devices. Suárez-Albela M; Fraga-Lamas P; Castedo L; Fernández-Caramés TM Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577524 [TBL] [Abstract][Full Text] [Related]