Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
A review of lightweight block ciphers
Embedded systems are deployed in various domains, including industrial installations,
critical and nomadic environments, private spaces and public infrastructures. Their operation …
critical and nomadic environments, private spaces and public infrastructures. Their operation …
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
We present a new tweakable block cipher family SKINNY, whose goal is to compete with
NSA recent design SIMON in terms of hardware/software performances, while proving in …
NSA recent design SIMON in terms of hardware/software performances, while proving in …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …
implementation of cryptographic primitives after the algorithms have been designed for …
Towards stream ciphers for efficient FHE with low-noise ciphertexts
P Méaux, A Journault, FX Standaert… - Advances in Cryptology …, 2016 - Springer
Symmetric ciphers purposed for Fully Homomorphic Encryption (FHE) have recently been
proposed for two main reasons. First, minimizing the implementation (time and memory) …
proposed for two main reasons. First, minimizing the implementation (time and memory) …
On a generalization of substitution-permutation networks: The HADES design strategy
L Grassi, R Lüftenegger, C Rechberger… - Advances in Cryptology …, 2020 - Springer
Keyed and unkeyed cryptographic permutations often iterate simple round functions.
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Substitution-permutation networks (SPNs) are an approach that is popular since the mid …
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Lightweight block ciphers for IoT: Energy optimization and survivability techniques
BJ Mohd, T Hayajneh - IEEE Access, 2018 - ieeexplore.ieee.org
With extraordinary growth in the Internet of Things (IoT), the amount of data exchanged
between IoT devices is growing at an unprecedented scale. Most of the IoT devices are low …
between IoT devices is growing at an unprecedented scale. Most of the IoT devices are low …
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
In this paper, we introduce a new lightweight 64-bit block cipher PIPO (PIPO stands for “Plug-
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …