A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
[HTML][HTML] A review of the nist lightweight cryptography finalists and their fault analyses
H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …
security attacks. One of the key security aspects is data integrity, which can be protected by …
Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers
J Feng, Y Wei, F Zhang, E Pasalic… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An optimized implementation of S-boxes has a significant impact on the performance of
cryptographic primitives. SAT-based methods can find optimal implementations for …
cryptographic primitives. SAT-based methods can find optimal implementations for …
Hardware and energy efficiency evaluation of nist lightweight cryptography standardization finalists
I Elsadek, S Aftabjahani, D Gardner… - … on Circuits and …, 2022 - ieeexplore.ieee.org
Current cryptographic algorithms are designed for server environments prioritizing security
with no limitations on hardware resources. They may not be suitable for emerging resource …
with no limitations on hardware resources. They may not be suitable for emerging resource …
RECO-ASCON: Reconfigurable ASCON hash functions for IoT applications
The need for reconfigurable lightweight cryptographic processors with low power
consumption for securing the Internet of Things (IoT) with adaptive functionalities is getting …
consumption for securing the Internet of Things (IoT) with adaptive functionalities is getting …
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
Lynx: Family of lightweight authenticated encryption schemes based on tweakable blockcipher
The widespread deployment of low-power and handheld devices opens an opportunity to
design lightweight authenticated encryption schemes. The schemes so proposed must also …
design lightweight authenticated encryption schemes. The schemes so proposed must also …