In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair and consistent evaluation of software implementations of lightweight cryptographic primitives for embedded devices. The framework is very flexible thanks to its modular structure, which allows for an easy integration of new metrics, target devices and evaluation scenarios. It consists of two modules that can currently asses the performance of lightweight block and stream ciphers on three widely used microcontrollers: 8-bit AVR, 16-bit MSP and 32-bit ARM. The metrics extracted are execution time, RAM consumption and binary code size. FELICS has a simple user interface and is intended to be used by cipher designers to compare new primitives with...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
The software performance of cryptographic schemes is an important factor in the decision to include ...
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
The design of lightweight block ciphers has been a very active research topic over the last years. H...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
The software performance of cryptographic schemes is an important factor in the decision to include ...
In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
The design of lightweight block ciphers has been a very active research topic over the last years. H...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...