The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags and nanosensors necessitates the use of lightweight block ciphers. Nevertheless, providing the required security properties does not guarantee their reliability and hardware assurance when the architectures are prone to natural and malicious faults. In this letter, error detection schemes for lightweight block ciphers are proposed with the case study of XTEA (eXtended TEA). Lightweight block ciphers such as XTEA, PRESENT, SIMON, and the like might be better suited for low-resource deeply-embedded systems compared to the Advanced Encryption Standard. Three different error detection approaches are presented and according to our fault-injection s...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
Cryptographic architectures provide different security properties to sensitive usage models. However...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Achieving secure high-performance implementations for constrained applications such as implantable a...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
The development of extremely-constrained embedded systems having sensitive nodes such as RFID tags a...
The widespread use of sensitive and constrained applications necessitates lightweight (low-power and...
The security and reliability of cryptosystems are endangered with natural occurring and malicious in...
Cryptographic architectures provide different security properties to sensitive usage models. However...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Achieving secure high-performance implementations for constrained applications such as implantable a...
As we are close to the advent of quantum computing capability, the potential use of resistant algori...
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive constrai...
Achieving secure, high performance implementations for constrained applications such as implantable ...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
International audienceWith the advance of autonomous systems, security is becoming the most crucial ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...