Although the AES is an excellent and preferred choice for almost all block cipher applications, it is not suitable for extremely constrained environments such as RFID (Radio-Frequency IDentification) tags and sensor networks. Therefore lightweight cryptography has become very vital and a strong demand in designing secure lightweight cryptographic modules is required. This paper meant to be a reference (for the cryptographic designers) on the lightweight block ciphers. It starts by doing a survey to collect the latest proposed ciphers, then to study them in terms of their algorithms specifications, hardware implementation and attacks. Finally, after the explanation and comparison, this research can be the basement for starting point to impro...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
With the establishment of the AES the need for new block ciphers has been greatly diminished; for al...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
peer reviewedIn this paper, we introduce a framework for the benchmarking of lightweight block ciphe...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
The restricted devices have a small memory, simple processor, and limited power. To secure them, we ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
With the establishment of the AES the need for new block ciphers has been greatly diminished; for al...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
peer reviewedIn this paper, we introduce a framework for the benchmarking of lightweight block ciphe...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
The restricted devices have a small memory, simple processor, and limited power. To secure them, we ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...