Design and hardware implementation of LED block cipher for vehicles keyless entry systems Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1016/j.eij.2025.100687
Security is paramount in vehicle keyless entry systems, as they are increasingly targeted by various attacks, including relay attacks, theft, and espionage. Keyless entry systems are particularly vulnerable to relay attacks, where attackers intercept and amplify the signal from the key fob, granting unauthorized access to the vehicle. This compromises the integrity of the system, emphasizing the need for robust encryption mechanisms to prevent unauthorized access and safeguard sensitive vehicle data. In this work, we propose an optimized hardware design for the Light Encryption Device (LED) cipher, aimed at enhancing both the security and efficiency of keyless entry systems. The proposed security system is evaluated using security metrics such as NPCR, UACI, entropy, and correlation analysis, demonstrating its robust protection against potential attacks. The obtained results show that the proposed hardware implementation delivers higher efficiency and enhanced security compared to existing designs, making it a promising solution for securing keyless vehicle entry systems. The real-world test scenarios assess the performance of the proposed hardware system, demonstrating its effectiveness in terms of execution time, power consumption, and battery drain time across different platforms, including Dual Core ARM Cortex-A9 and Zynq XC7Z020. The results reveal that the proposed designs offer improved efficiency and security, positioning them as a viable solution for safeguarding keyless entry systems against unauthorized access. This work underscores the potential of lightweight cryptography to tackle both security and performance challenges in modern automotive systems, ensuring the safety and integrity of vehicle access control.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.eij.2025.100687
- OA Status
- gold
- References
- 33
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4410080563
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4410080563Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.eij.2025.100687Digital Object Identifier
- Title
-
Design and hardware implementation of LED block cipher for vehicles keyless entry systemsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-29Full publication date if available
- Authors
-
Ayoub Mhaouch, Wafa Gtifa, Abdesslem Abdeali, Anis Sakly, Mohsen MachhoutList of authors in order
- Landing page
-
https://doi.org/10.1016/j.eij.2025.100687Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.eij.2025.100687Direct OA link when available
- Concepts
-
Computer science, Computer hardware, Block cipher, Block (permutation group theory), Embedded system, LED display, Cipher, Cryptography, Computer security, Encryption, Operating system, Geometry, MathematicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
33Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4410080563 |
|---|---|
| doi | https://doi.org/10.1016/j.eij.2025.100687 |
| ids.doi | https://doi.org/10.1016/j.eij.2025.100687 |
| ids.openalex | https://openalex.org/W4410080563 |
| fwci | 0.0 |
| type | article |
| title | Design and hardware implementation of LED block cipher for vehicles keyless entry systems |
| biblio.issue | |
| biblio.volume | 30 |
| biblio.last_page | 100687 |
| biblio.first_page | 100687 |
| topics[0].id | https://openalex.org/T10951 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptographic Implementations and Security |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9973999857902527 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T11130 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.991100013256073 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Coding theory and cryptography |
| funders[0].id | https://openalex.org/F4320317243 |
| funders[0].ror | https://ror.org/00nhtcg76 |
| funders[0].display_name | Université Monastir |
| is_xpac | False |
| apc_list.value | 1000 |
| apc_list.currency | USD |
| apc_list.value_usd | 1000 |
| apc_paid.value | 1000 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1000 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9142075777053833 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C9390403 |
| concepts[1].level | 1 |
| concepts[1].score | 0.6330108642578125 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3966 |
| concepts[1].display_name | Computer hardware |
| concepts[2].id | https://openalex.org/C106544461 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6010175943374634 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q543151 |
| concepts[2].display_name | Block cipher |
| concepts[3].id | https://openalex.org/C2777210771 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5260301232337952 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[3].display_name | Block (permutation group theory) |
| concepts[4].id | https://openalex.org/C149635348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.47535890340805054 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q193040 |
| concepts[4].display_name | Embedded system |
| concepts[5].id | https://openalex.org/C2780301859 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4402570426464081 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q13427211 |
| concepts[5].display_name | LED display |
| concepts[6].id | https://openalex.org/C2780221543 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4179012179374695 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4681865 |
| concepts[6].display_name | Cipher |
| concepts[7].id | https://openalex.org/C178489894 |
| concepts[7].level | 2 |
| concepts[7].score | 0.2695409059524536 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[7].display_name | Cryptography |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.17478150129318237 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C148730421 |
| concepts[9].level | 2 |
| concepts[9].score | 0.14661267399787903 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[9].display_name | Encryption |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.14531755447387695 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| concepts[11].id | https://openalex.org/C2524010 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[11].display_name | Geometry |
| concepts[12].id | https://openalex.org/C33923547 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[12].display_name | Mathematics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9142075777053833 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-hardware |
| keywords[1].score | 0.6330108642578125 |
| keywords[1].display_name | Computer hardware |
| keywords[2].id | https://openalex.org/keywords/block-cipher |
| keywords[2].score | 0.6010175943374634 |
| keywords[2].display_name | Block cipher |
| keywords[3].id | https://openalex.org/keywords/block |
| keywords[3].score | 0.5260301232337952 |
| keywords[3].display_name | Block (permutation group theory) |
| keywords[4].id | https://openalex.org/keywords/embedded-system |
| keywords[4].score | 0.47535890340805054 |
| keywords[4].display_name | Embedded system |
| keywords[5].id | https://openalex.org/keywords/led-display |
| keywords[5].score | 0.4402570426464081 |
| keywords[5].display_name | LED display |
| keywords[6].id | https://openalex.org/keywords/cipher |
| keywords[6].score | 0.4179012179374695 |
| keywords[6].display_name | Cipher |
| keywords[7].id | https://openalex.org/keywords/cryptography |
| keywords[7].score | 0.2695409059524536 |
| keywords[7].display_name | Cryptography |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.17478150129318237 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/encryption |
| keywords[9].score | 0.14661267399787903 |
| keywords[9].display_name | Encryption |
| keywords[10].id | https://openalex.org/keywords/operating-system |
| keywords[10].score | 0.14531755447387695 |
| keywords[10].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1016/j.eij.2025.100687 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S97403527 |
| locations[0].source.issn | 1110-8665, 2090-4754 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1110-8665 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Egyptian Informatics Journal |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Egyptian Informatics Journal |
| locations[0].landing_page_url | https://doi.org/10.1016/j.eij.2025.100687 |
| locations[1].id | pmh:oai:doaj.org/article:584e38fa4e054e159df10b175d4731b3 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Egyptian Informatics Journal, Vol 30, Iss , Pp 100687- (2025) |
| locations[1].landing_page_url | https://doaj.org/article/584e38fa4e054e159df10b175d4731b3 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5030186848 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Ayoub Mhaouch |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ayoub Mhaouch |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5056995426 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Wafa Gtifa |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wafa Gtifa |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5117432958 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Abdesslem Abdeali |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Abdesslem Abdeali |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5004947873 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-3608-0386 |
| authorships[3].author.display_name | Anis Sakly |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Anis Sakly |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5066475844 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-5629-0508 |
| authorships[4].author.display_name | Mohsen Machhout |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Mohsen Machhout |
| authorships[4].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.eij.2025.100687 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Design and hardware implementation of LED block cipher for vehicles keyless entry systems |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10951 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptographic Implementations and Security |
| related_works | https://openalex.org/W1638546798, https://openalex.org/W2366324288, https://openalex.org/W4390979909, https://openalex.org/W2350010447, https://openalex.org/W4389575897, https://openalex.org/W2117179505, https://openalex.org/W3080116368, https://openalex.org/W1524307340, https://openalex.org/W2386184510, https://openalex.org/W2150878966 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1016/j.eij.2025.100687 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S97403527 |
| best_oa_location.source.issn | 1110-8665, 2090-4754 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1110-8665 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Egyptian Informatics Journal |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Egyptian Informatics Journal |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.eij.2025.100687 |
| primary_location.id | doi:10.1016/j.eij.2025.100687 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S97403527 |
| primary_location.source.issn | 1110-8665, 2090-4754 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1110-8665 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Egyptian Informatics Journal |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Egyptian Informatics Journal |
| primary_location.landing_page_url | https://doi.org/10.1016/j.eij.2025.100687 |
| publication_date | 2025-04-29 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4281261769, https://openalex.org/W3120153504, https://openalex.org/W3118799686, https://openalex.org/W4295088039, https://openalex.org/W6853740848, https://openalex.org/W6639565960, https://openalex.org/W3000158261, https://openalex.org/W6772168212, https://openalex.org/W3128067070, https://openalex.org/W3163763196, https://openalex.org/W2504919933, https://openalex.org/W2747441544, https://openalex.org/W1853704432, https://openalex.org/W2141124495, https://openalex.org/W2557137489, https://openalex.org/W4388535903, https://openalex.org/W2904012887, https://openalex.org/W2198751313, https://openalex.org/W6756940076, https://openalex.org/W3168681689, https://openalex.org/W3135035593, https://openalex.org/W1971944600, https://openalex.org/W2004164731, https://openalex.org/W6629428129, https://openalex.org/W6849802115, https://openalex.org/W4288070531, https://openalex.org/W4381302572, https://openalex.org/W2246315406, https://openalex.org/W2901902006, https://openalex.org/W1487782177, https://openalex.org/W69150401, https://openalex.org/W2997790288, https://openalex.org/W4244893479 |
| referenced_works_count | 33 |
| abstract_inverted_index.a | 144, 205 |
| abstract_inverted_index.In | 71 |
| abstract_inverted_index.an | 76 |
| abstract_inverted_index.as | 8, 109, 204 |
| abstract_inverted_index.at | 88 |
| abstract_inverted_index.by | 13 |
| abstract_inverted_index.in | 3, 168, 231 |
| abstract_inverted_index.is | 1, 103 |
| abstract_inverted_index.it | 143 |
| abstract_inverted_index.of | 52, 95, 160, 170, 221, 240 |
| abstract_inverted_index.to | 28, 45, 62, 139, 224 |
| abstract_inverted_index.we | 74 |
| abstract_inverted_index.ARM | 185 |
| abstract_inverted_index.The | 99, 123, 153, 190 |
| abstract_inverted_index.and | 20, 34, 66, 93, 113, 135, 175, 187, 200, 228, 238 |
| abstract_inverted_index.are | 10, 25 |
| abstract_inverted_index.for | 58, 80, 147, 208 |
| abstract_inverted_index.its | 117, 166 |
| abstract_inverted_index.key | 40 |
| abstract_inverted_index.the | 36, 39, 46, 50, 53, 56, 81, 91, 128, 158, 161, 194, 219, 236 |
| abstract_inverted_index.Core | 184 |
| abstract_inverted_index.Dual | 183 |
| abstract_inverted_index.This | 48, 216 |
| abstract_inverted_index.Zynq | 188 |
| abstract_inverted_index.both | 90, 226 |
| abstract_inverted_index.fob, | 41 |
| abstract_inverted_index.from | 38 |
| abstract_inverted_index.need | 57 |
| abstract_inverted_index.show | 126 |
| abstract_inverted_index.such | 108 |
| abstract_inverted_index.test | 155 |
| abstract_inverted_index.that | 127, 193 |
| abstract_inverted_index.them | 203 |
| abstract_inverted_index.they | 9 |
| abstract_inverted_index.this | 72 |
| abstract_inverted_index.time | 178 |
| abstract_inverted_index.work | 217 |
| abstract_inverted_index.(LED) | 85 |
| abstract_inverted_index.Light | 82 |
| abstract_inverted_index.NPCR, | 110 |
| abstract_inverted_index.UACI, | 111 |
| abstract_inverted_index.aimed | 87 |
| abstract_inverted_index.data. | 70 |
| abstract_inverted_index.drain | 177 |
| abstract_inverted_index.entry | 6, 23, 97, 151, 211 |
| abstract_inverted_index.offer | 197 |
| abstract_inverted_index.power | 173 |
| abstract_inverted_index.relay | 17, 29 |
| abstract_inverted_index.terms | 169 |
| abstract_inverted_index.time, | 172 |
| abstract_inverted_index.using | 105 |
| abstract_inverted_index.where | 31 |
| abstract_inverted_index.work, | 73 |
| abstract_inverted_index.Device | 84 |
| abstract_inverted_index.access | 44, 65, 242 |
| abstract_inverted_index.across | 179 |
| abstract_inverted_index.assess | 157 |
| abstract_inverted_index.design | 79 |
| abstract_inverted_index.higher | 133 |
| abstract_inverted_index.making | 142 |
| abstract_inverted_index.modern | 232 |
| abstract_inverted_index.reveal | 192 |
| abstract_inverted_index.robust | 59, 118 |
| abstract_inverted_index.safety | 237 |
| abstract_inverted_index.signal | 37 |
| abstract_inverted_index.system | 102 |
| abstract_inverted_index.tackle | 225 |
| abstract_inverted_index.theft, | 19 |
| abstract_inverted_index.viable | 206 |
| abstract_inverted_index.Keyless | 22 |
| abstract_inverted_index.access. | 215 |
| abstract_inverted_index.against | 120, 213 |
| abstract_inverted_index.amplify | 35 |
| abstract_inverted_index.battery | 176 |
| abstract_inverted_index.cipher, | 86 |
| abstract_inverted_index.designs | 196 |
| abstract_inverted_index.keyless | 5, 96, 149, 210 |
| abstract_inverted_index.metrics | 107 |
| abstract_inverted_index.prevent | 63 |
| abstract_inverted_index.propose | 75 |
| abstract_inverted_index.results | 125, 191 |
| abstract_inverted_index.system, | 54, 164 |
| abstract_inverted_index.systems | 24, 212 |
| abstract_inverted_index.various | 14 |
| abstract_inverted_index.vehicle | 4, 69, 150, 241 |
| abstract_inverted_index.Security | 0 |
| abstract_inverted_index.XC7Z020. | 189 |
| abstract_inverted_index.attacks, | 15, 18, 30 |
| abstract_inverted_index.attacks. | 122 |
| abstract_inverted_index.compared | 138 |
| abstract_inverted_index.control. | 243 |
| abstract_inverted_index.delivers | 132 |
| abstract_inverted_index.designs, | 141 |
| abstract_inverted_index.enhanced | 136 |
| abstract_inverted_index.ensuring | 235 |
| abstract_inverted_index.entropy, | 112 |
| abstract_inverted_index.existing | 140 |
| abstract_inverted_index.granting | 42 |
| abstract_inverted_index.hardware | 78, 130, 163 |
| abstract_inverted_index.improved | 198 |
| abstract_inverted_index.obtained | 124 |
| abstract_inverted_index.proposed | 100, 129, 162, 195 |
| abstract_inverted_index.securing | 148 |
| abstract_inverted_index.security | 92, 101, 106, 137, 227 |
| abstract_inverted_index.solution | 146, 207 |
| abstract_inverted_index.systems, | 7, 234 |
| abstract_inverted_index.systems. | 98, 152 |
| abstract_inverted_index.targeted | 12 |
| abstract_inverted_index.vehicle. | 47 |
| abstract_inverted_index.Cortex-A9 | 186 |
| abstract_inverted_index.analysis, | 115 |
| abstract_inverted_index.attackers | 32 |
| abstract_inverted_index.different | 180 |
| abstract_inverted_index.enhancing | 89 |
| abstract_inverted_index.evaluated | 104 |
| abstract_inverted_index.execution | 171 |
| abstract_inverted_index.including | 16, 182 |
| abstract_inverted_index.integrity | 51, 239 |
| abstract_inverted_index.intercept | 33 |
| abstract_inverted_index.optimized | 77 |
| abstract_inverted_index.paramount | 2 |
| abstract_inverted_index.potential | 121, 220 |
| abstract_inverted_index.promising | 145 |
| abstract_inverted_index.safeguard | 67 |
| abstract_inverted_index.scenarios | 156 |
| abstract_inverted_index.security, | 201 |
| abstract_inverted_index.sensitive | 68 |
| abstract_inverted_index.Encryption | 83 |
| abstract_inverted_index.automotive | 233 |
| abstract_inverted_index.challenges | 230 |
| abstract_inverted_index.efficiency | 94, 134, 199 |
| abstract_inverted_index.encryption | 60 |
| abstract_inverted_index.espionage. | 21 |
| abstract_inverted_index.mechanisms | 61 |
| abstract_inverted_index.platforms, | 181 |
| abstract_inverted_index.protection | 119 |
| abstract_inverted_index.real-world | 154 |
| abstract_inverted_index.vulnerable | 27 |
| abstract_inverted_index.compromises | 49 |
| abstract_inverted_index.correlation | 114 |
| abstract_inverted_index.emphasizing | 55 |
| abstract_inverted_index.lightweight | 222 |
| abstract_inverted_index.performance | 159, 229 |
| abstract_inverted_index.positioning | 202 |
| abstract_inverted_index.underscores | 218 |
| abstract_inverted_index.consumption, | 174 |
| abstract_inverted_index.cryptography | 223 |
| abstract_inverted_index.increasingly | 11 |
| abstract_inverted_index.particularly | 26 |
| abstract_inverted_index.safeguarding | 209 |
| abstract_inverted_index.unauthorized | 43, 64, 214 |
| abstract_inverted_index.demonstrating | 116, 165 |
| abstract_inverted_index.effectiveness | 167 |
| abstract_inverted_index.implementation | 131 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.06365695 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |