Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

Hardware limitations of lightweight cryptographic designs for IoT in healthcare

K Tsantikidou, N Sklavos - Cryptography, 2022 - mdpi.com
Security is an important aspect of healthcare applications that employ Internet of Things (IoT)
technology. More specifically, providing privacy and ensuring the confidentiality, integrity …

[PDF][PDF] ACE: An authenticated encryption and hash algorithm

M Aagaard, R AlTawy, G Gong, K Mandal… - Submission to NIST-LWC …, 2019 - lab.las3.de
5 Design Rationale 26 5.1 Choice of the Mode: sLiSCP Sponge Mode................ 26 5.2 ACE
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …

The welch-gong stream cipher-evolutionary path

N Zidarič, K Mandal, G Gong, M Aagaard - Cryptography and …, 2024 - Springer
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …

[PDF][PDF] Spix: An authenticated cipher submission to the NIST LWC competition

R AlTawy, G Gong, M He, K Mandal… - Submitted to NIST …, 2019 - lab.las3.de
4 Design Rationale 21 4.1 Choice of the Mode: Monkey Duplex Sponge Mode.......... 21 4.2
Spix State Size.............................. 21 4.3 Nonlinear Layer: Simeck Sbox...................... 22 4.4 …

Securing internet-of-things

G Gong - International Symposium on Foundations and Practice …, 2018 - Springer
In this survey, we first present some vulnerabilities and attacks on IoT systems, and
classification of IoT devices, we then show the evolution of the development of lightweight …

Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers

X Wang, B Wu, L Hou, D Lin - Cybersecurity, 2021 - Springer
In this paper, we greatly increase the number of impossible differentials for SIMON and
SIMECK by eliminating the 1-bit constraint in input/output difference, which is the …

High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security

JT Amael, O Natan, JE Istiyanto - arXiv preprint arXiv:2409.09928, 2024 - arxiv.org
This research highlights the rapid development of technology in the industry, particularly
Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT) …

[PDF][PDF] SIMON 算法相关密钥不可能差分特征搜索

王旭姿, 吴保峰, 侯林, 林东岱 - Journal of Cryptologic Research, 2021 - jcr.cacrnet.org.cn
本文通过求解SIMON 算法密钥扩展算法的混合整数线性规划(mixed-integer linear
programming, MILP) 模型, 首次给出其相关密钥不可能差分分析结果. 对分组密码算法的不可能 …

Design and cryptanalysis of lightweight symmetric key primitives

R Rohit - 2020 - uwspace.uwaterloo.ca
The need for lightweight cryptographic primitives to replace the traditional standardized
primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained …