Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms of memory, processing speed, and battery supply. Furthermore, we are witnessing the phenomena of halving of the price for constant computing power in less than two years. RFID processes sensitive health-monitoring or biometric data. Accordingly there is a demand for specially-designed cryptographic primitives that are to be efficiently implemented. For these implementations and ciphers that are particularly suited for this purpose, we use the term “lightweight cipher”. The Expeditious Cipher (X-cipher) is a high throughput light-weight cipher with relatively simple design and hardware implementation. In this article, we discuss the cipher de...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
With the establishment of the AES the need for new block ciphers has been greatly diminished; for al...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed netw...
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
This thesis presents work on the efficiency and security of cryptographic software. First it describ...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
With the establishment of the AES the need for new block ciphers has been greatly diminished; for al...
Society is undergoing a paradigm shift where the Information and Communication Technology (ICT) revo...
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed netw...
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Modern cryptographic algorithms play an irreplaceable role in data communication systems for various...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Cryptography can be considered as a special application of coding schemes. High speed execution of E...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...