With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a comparative study of four of these schemes, namely TEA, XTEA, PRESENT and Simon, explaining how they work and discussing their vulnerabilities and performances. This paper specifically considers the performance of Application Specific Integrated Circuit (ASIC) implementations with regards to their size, throughput, power usage and energy usage per bit encrypted. TEA and PRESENT were found to have po...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In the field of computers and with the advent of the internet, the topic of secure communication has...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
This paper examines different encryption algorithms, which are specifically used for mobile and emb...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
With the advent of technologies like Internet of Things (IoT) and Machine to Machine (M2M) communica...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In the field of computers and with the advent of the internet, the topic of secure communication has...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
This paper examines different encryption algorithms, which are specifically used for mobile and emb...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
With the advent of technologies like Internet of Things (IoT) and Machine to Machine (M2M) communica...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
Modern cryptography responds to the need for security that has arisen with the emergence of communic...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In the field of computers and with the advent of the internet, the topic of secure communication has...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...