Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

Vulnerabilities and limitations of MQTT protocol used between IoT devices

D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …

Midori: A Block Cipher for Low Energy

S Banik, A Bogdanov, T Isobe, K Shibutani… - Advances in Cryptology …, 2015 - Springer
In the past few years, lightweight cryptography has become a popular research discipline
with a number of ciphers and hash functions proposed. The designers' focus has been …

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

J Borghoff, A Canteaut, T Güneysu, EB Kavun… - Advances in Cryptology …, 2012 - Springer
This paper presents a block cipher that is optimized with respect to latency when
implemented in hardware. Such ciphers are desirable for many future pervasive applications …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

A review of lightweight block ciphers

G Hatzivasilis, K Fysarakis, I Papaefstathiou… - Journal of cryptographic …, 2018 - Springer
Embedded systems are deployed in various domains, including industrial installations,
critical and nomadic environments, private spaces and public infrastructures. Their operation …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Preventing page faults from telling your secrets

S Shinde, ZL Chua, V Narayanan… - … of the 11th ACM on Asia …, 2016 - dl.acm.org
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …