Abstract
The overhead for resource utilization in the round coding operation of security coding is large. Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization. This resource consumption intern leads to large power consumption and area overhead. To minimize the resource utilization in this paper, a new resource optimization technique following resource reutilization scheme is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography coding.
Author supplied keywords
Cite
CITATION STYLE
Tappari, S., & Sridevi, K. (2019). Resource optimized security coding in light weight security protocol. International Journal of Innovative Technology and Exploring Engineering, 8(10), 2645–2651. https://doi.org/10.35940/ijitee.J9393.0881019
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.