G
Gaurav Bansod
Researcher at Pune Institute of Computer Technology
Publications - 26
Citations - 333
Gaurav Bansod is an academic researcher from Pune Institute of Computer Technology. The author has contributed to research in topics: Cipher & Encryption. The author has an hindex of 8, co-authored 24 publications receiving 196 citations. Previous affiliations of Gaurav Bansod include Symbiosis International University & Army Institute of Technology, Pune.
Papers
More filters
Journal ArticleDOI
Implementation of a New Lightweight Encryption Design for Embedded Security
TL;DR: A hybrid cryptosystem, which consists of GRP and S-box of PRESENT, is designed and implemented on a 32-bit processor and results in 2125 gate equivalents, which is better than other light variant models like DESXL, CLEFIA, and AES.
Proceedings ArticleDOI
LiCi: A new ultra-lightweight block cipher
TL;DR: This paper proposed the security analysis as well as performance parameter of the LiCi, a new lightweight, low power block cipher which resists the linear and differential attack and shows the good resistance against the advanced attack like Biclique and Zero correlation.
Journal ArticleDOI
BORON: an ultra-lightweight and low power encryption design for pervasive computing
TL;DR: BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role and it has a higher throughput as compared to other existing SP network ciphers.
Journal ArticleDOI
PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing
TL;DR: PICO has a very strong substitution layer (S-box) which not only makes the design robust but also introduces a great avalanche effect which can thwart the linear and differential attacks on the cipher.
Journal ArticleDOI
ANU: an ultra lightweight cipher design for security in IoT
TL;DR: This paper furnishes the complete security analysis of the ANU cipher design and shows that ANU can attain ample security level against linear and differential cryptanalysis, biclique attack, zero-correlation attack, and algebraic attack.