Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

Analysis of lightweight cryptographic algorithms on iot hardware platform

M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …

Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V

A Adomnicai, T Peyrin - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
The fixslicing implementation strategy was originally introduced as a new representation for
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …

WARP: Revisiting GFN for lightweight 128-bit block cipher

S Banik, Z Bao, T Isobe, H Kubo, F Liu… - Selected Areas in …, 2021 - Springer
In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims
at small-footprint circuit in the field of 128-bit block ciphers, possibly for a unified encryption …

Modified lightweight cryptography scheme and its applications in IoT environment

N Yasmin, R Gupta - International Journal of Information Technology, 2023 - Springer
Interconnected devices have been with us for a long time. The security of the data
exchanged through these devices is a matter of grave concern. While exchanging …

Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT

B Zhao, X Dong, W Meier, K Jia, G Wang - Designs, Codes and …, 2020 - Springer
This paper gives a new generalized key-recovery model of related-key rectangle attacks on
block ciphers with linear key schedules. The model is quite optimized and applicable to …

[PDF][PDF] Fortifying IoT against crimpling cyber-attacks: a systematic review

U Tariq, I Ahmed, MA Khan, AK Bashir - Karbala International Journal of …, 2023 - iasj.net
The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday
lives create exciting opportunities for human involvement, data integration, and seamless …

Towards key-recovery-attack friendly distinguishers: application to GIFT-128

R Zong, X Dong, H Chen, Y Luo, S Wang… - IACR Transactions on …, 2021 - tosc.iacr.org
When analyzing a block cipher, the first step is to search for some valid distinguishers, for
example, the differential trails in the differential cryptanalysis and the linear trails in the linear …

Generic attack on duplex-based aead modes using random function statistics

H Gilbert, R Heim Boissier, L Khati, Y Rotella - … Conference on the Theory …, 2023 - Springer
Duplex-based authenticated encryption modes with a sufficiently large key length are
proven to be secure up to the birthday bound 2 c 2, where c is the capacity. However this …