scispace - formally typeset
G

Gaurav Bansod

Researcher at Pune Institute of Computer Technology

Publications -  26
Citations -  333

Gaurav Bansod is an academic researcher from Pune Institute of Computer Technology. The author has contributed to research in topics: Cipher & Encryption. The author has an hindex of 8, co-authored 24 publications receiving 196 citations. Previous affiliations of Gaurav Bansod include Symbiosis International University & Army Institute of Technology, Pune.

Papers
More filters
Journal ArticleDOI

Implementation of a New Lightweight Encryption Design for Embedded Security

TL;DR: A hybrid cryptosystem, which consists of GRP and S-box of PRESENT, is designed and implemented on a 32-bit processor and results in 2125 gate equivalents, which is better than other light variant models like DESXL, CLEFIA, and AES.
Proceedings ArticleDOI

LiCi: A new ultra-lightweight block cipher

TL;DR: This paper proposed the security analysis as well as performance parameter of the LiCi, a new lightweight, low power block cipher which resists the linear and differential attack and shows the good resistance against the advanced attack like Biclique and Zero correlation.
Journal ArticleDOI

BORON: an ultra-lightweight and low power encryption design for pervasive computing

TL;DR: BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role and it has a higher throughput as compared to other existing SP network ciphers.
Journal ArticleDOI

PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing

TL;DR: PICO has a very strong substitution layer (S-box) which not only makes the design robust but also introduces a great avalanche effect which can thwart the linear and differential attacks on the cipher.
Journal ArticleDOI

ANU: an ultra lightweight cipher design for security in IoT

TL;DR: This paper furnishes the complete security analysis of the ANU cipher design and shows that ANU can attain ample security level against linear and differential cryptanalysis, biclique attack, zero-correlation attack, and algebraic attack.