Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
Understanding security requirements and challenges in Internet of Things (IoT): A review
Internet of things (IoT) is realized by the idea of free flow of information amongst various low‐
power embedded devices that use the Internet to communicate with one another. It is …
power embedded devices that use the Internet to communicate with one another. It is …
Lightweight cryptography methods
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
Design Strategies for ARX with Provable Bounds: Sparx and LAX
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
Efficient implementation of PRESENT and GIFT on quantum computers
Grover search algorithm is the most representative quantum attack method that threatens the
security of symmetric key cryptography. If the Grover search algorithm is applied to …
security of symmetric key cryptography. If the Grover search algorithm is applied to …
Shadow: A lightweight block cipher for IoT nodes
Y Guo, L Li, B Liu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The advancement of the Internet of Things (IoT) has promoted the rapid development of low-
power and multifunctional sensors. However, it is seriously significant to ensure the security …
power and multifunctional sensors. However, it is seriously significant to ensure the security …
CHAM: A family of lightweight block ciphers for resource-constrained devices
B Koo, D Roh, H Kim, Y Jung, DG Lee… - International conference on …, 2017 - Springer
In this paper, we propose a family of lightweight block ciphers CHAM that has remarkable
efficiency on resource-constrained devices. The family consists of three ciphers, CHAM …
efficiency on resource-constrained devices. The family consists of three ciphers, CHAM …
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
In this paper, we introduce a new lightweight 64-bit block cipher PIPO (PIPO stands for “Plug-
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …
In” and “Plug-Out”, representing its use in side-channel protected and unprotected …
Revised Version of Block Cipher CHAM
D Roh, B Koo, Y Jung, IW Jeong, DG Lee… - Information Security and …, 2020 - Springer
CHAM is a family of lightweight block ciphers published in 2017 [22]. The CHAM family
consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256. CHAM can …
consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256. CHAM can …
Evaluation of SPN-based lightweight crypto-ciphers
Lightweight cryptography has recently emerged as a strong requirement for any highly
constrained connected device; encryption/decryption processes must strike the balance …
constrained connected device; encryption/decryption processes must strike the balance …