Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly not so mature, yet it has large impact in performance. Therefore, there is a great demand for lightweight mode of operation, especially that for authenticated encryption with associated data (AEAD). Among many known properties of conventional modes of operation, the following four properties are essential for constrained devices: Minimum State Size: the state size equals to a block size of a blockcipher. Inverse Free: no need for a blockcipher decryption. XOR Only: only XOR is needed in addition to a blockcipher encryption. Online: a data block...
NIST has recently initiated a standardization project for efficient lightweight authenticated encryp...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and ...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
In this article, we propose two new families of very lightweight and efficient authenticated encrypt...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
© International Association for Cryptologic Research 2016. Lightweight cryptography strives to prote...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
The restricted devices have a small memory, simple processor, and limited power. To secure them, we ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
NIST has recently initiated a standardization project for efficient lightweight authenticated encryp...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and ...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
In this article, we propose two new families of very lightweight and efficient authenticated encrypt...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
© International Association for Cryptologic Research 2016. Lightweight cryptography strives to prote...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
The restricted devices have a small memory, simple processor, and limited power. To secure them, we ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
NIST has recently initiated a standardization project for efficient lightweight authenticated encryp...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
© Springer-Verlag Berlin Heidelberg 2013. In this paper we perform a comprehensive area, power, and ...