peer reviewedIn this paper, we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate the execution time, RAM footprint, as well as binary code size, and allows one to define a custom "figure of merit" according to which all evaluated candidates can be ranked. We used the framework to benchmark implementations of 19 lightweight ciphers, namely AES, Chaskey, Fantomas, HIGHT, LBlock, LEA, LED, Piccolo, PRESENT, PRIDE, PRINCE, RC5, RECTANGLE, RoadRunneR, Robin, Simon, SPARX, Speck, and TWINE, on three microcontroller platforms: 8-bit AVR, 16-bit MSP430, and 32-bit ARM. Our results bring some new insights into the question of how well these lightweight ciph...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
peer reviewedIn this paper, we introduce a framework for the benchmarking of lightweight block ciphe...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Lightweight cryptography has been one of the hot topics in symmetric cryptography in the recent ye...
Designing block ciphers targeting resource constrained 8-bit CPUs is a challenging problem. There ar...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
peer reviewedIn this paper, we introduce a framework for the benchmarking of lightweight block ciphe...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
International audienceFor security applications in wireless sensor networks (WSNs), choosing best al...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Lightweight cryptography has been one of the hot topics in symmetric cryptography in the recent ye...
Designing block ciphers targeting resource constrained 8-bit CPUs is a challenging problem. There ar...
The security of resource-constrained devices is critical in the IoT field, given that everything is ...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...