Research Article
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
Figure 11
Result of Baboon image. (a) Original image. (b) Histogram of the original image. (c) PRESENT ciphered. (d) Histogram of PRESENT ciphered. (e) PRINCE ciphered. (f) Histogram of PRINCE ciphered.