Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciphers drain less battery, they are invaluable components of devices that operate on a tight energy budget such as handheld devices or RFID tags. At Asiacrypt 2015, Banik et al. presented the block cipher family Midori which was designed to optimize the energy consumed per encryption and which reduces the energy consumption by more than 30% compared to previous block ciphers. However, if one has to encrypt/decrypt longer streams of data, i.e. for bulk data encryption/decryption, it is expected that a stream cipher should perform even better than block ciphers in terms of energy required to encrypt. In this paper, we address the question of desig...
Providing data confidentiality for energyconstrained devices has proven to be a hard problem. Over t...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciph...
In the past few years, lightweight cryptography has become a popular research discipline with a numb...
Abstract. In the past few years, lightweight cryptography has become a popular research discipline w...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
Low energy consumption is an important factor in today\u27s technologies as many devices run on a ba...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and ...
We provide a comprehensive evaluation of several lightweight block ciphers with respect to various h...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Providing data confidentiality for energyconstrained devices has proven to be a hard problem. Over t...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
Energy optimization is an important design aspect of lightweight cryptography. Since low energy ciph...
In the past few years, lightweight cryptography has become a popular research discipline with a numb...
Abstract. In the past few years, lightweight cryptography has become a popular research discipline w...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
Low energy consumption is an important factor in today\u27s technologies as many devices run on a ba...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and ...
We provide a comprehensive evaluation of several lightweight block ciphers with respect to various h...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
Providing data confidentiality for energyconstrained devices has proven to be a hard problem. Over t...
As the importance and the value of exchanged data over the Internet or other media types are increas...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...