Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
FPGA benchmarking of round 2 candidates in the NIST lightweight cryptography standardization process: Methodology, metrics, tools, and results
K Mohajerani, R Haeussler, R Nagpal… - Cryptology ePrint …, 2020 - eprint.iacr.org
Twenty seven Round 2 candidates in the NIST Lightweight Cryptography (LWC) process
have been implemented in hardware by groups from all over the world. All implementations …
have been implemented in hardware by groups from all over the world. All implementations …
IoT-HarPSecA: a framework and roadmap for secure design and development of devices and applications in the IoT space
The past couple of years have marked continued growth in the applications and services of
the Internet of Things (IoT). This has attracted the attention of new operators as well as …
the Internet of Things (IoT). This has attracted the attention of new operators as well as …
Hardware implementations of NIST lightweight cryptographic candidates: A first look
Achieving security in the Internet of Things (IoT) is challenging. The need for lightweight yet
robust cryptographic solutions suitable for the IoT calls for improved design and …
robust cryptographic solutions suitable for the IoT calls for improved design and …
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …
Robustness (CAESAR) supported by the National Institute of Standards and Technology …
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu… - … Hardware and Embedded …, 2017 - Springer
This paper presents a design of authenticated encryption (AE) focusing on minimizing the
implementation size, ie, hardware gates or working memory on software. The scheme is …
implementation size, ie, hardware gates or working memory on software. The scheme is …
Scalable and efficient hardware architectures for authenticated encryption in IoT applications
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
Evaluating the performance of ascon lightweight authenticated encryption for ai-enabled iot devices
Internet of Things (IoTs) have proliferated our daily lives with numerous applications ranging
from smart appliances to smart cities. IoT devices exchange sensor data by connecting to an …
from smart appliances to smart cities. IoT devices exchange sensor data by connecting to an …
[PDF][PDF] Hardware api for lightweight cryptography
In this paper, we define the Lightweight Cryptography (LWC) Hardware Application
Programming Interface (API) for the implementations of lightweight authenticated ciphers …
Programming Interface (API) for the implementations of lightweight authenticated ciphers …