Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
Analysis of lightweight cryptographic algorithms on iot hardware platform
M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …
Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
A Adomnicai, T Peyrin - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
The fixslicing implementation strategy was originally introduced as a new representation for
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …
WARP: Revisiting GFN for lightweight 128-bit block cipher
In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims
at small-footprint circuit in the field of 128-bit block ciphers, possibly for a unified encryption …
at small-footprint circuit in the field of 128-bit block ciphers, possibly for a unified encryption …
Modified lightweight cryptography scheme and its applications in IoT environment
N Yasmin, R Gupta - International Journal of Information Technology, 2023 - Springer
Interconnected devices have been with us for a long time. The security of the data
exchanged through these devices is a matter of grave concern. While exchanging …
exchanged through these devices is a matter of grave concern. While exchanging …
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
This paper gives a new generalized key-recovery model of related-key rectangle attacks on
block ciphers with linear key schedules. The model is quite optimized and applicable to …
block ciphers with linear key schedules. The model is quite optimized and applicable to …
[PDF][PDF] Fortifying IoT against crimpling cyber-attacks: a systematic review
The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday
lives create exciting opportunities for human involvement, data integration, and seamless …
lives create exciting opportunities for human involvement, data integration, and seamless …
Towards key-recovery-attack friendly distinguishers: application to GIFT-128
When analyzing a block cipher, the first step is to search for some valid distinguishers, for
example, the differential trails in the differential cryptanalysis and the linear trails in the linear …
example, the differential trails in the differential cryptanalysis and the linear trails in the linear …
Generic attack on duplex-based aead modes using random function statistics
Duplex-based authenticated encryption modes with a sufficiently large key length are
proven to be secure up to the birthday bound 2 c 2, where c is the capacity. However this …
proven to be secure up to the birthday bound 2 c 2, where c is the capacity. However this …