International audienceFor constrained devices, standard cryptographic algorithms can be too big, too slow or too energy-consuming. The area of lightweight cryptography studies new algorithms to overcome these problems. In this paper, we will focus on symmetric-key encryption, authentication and hashing. Instead of providing a full overview of this area of research, we will highlight three interesting topics. Firstly, we will explore the generic security of lightweight constructions. In particular, we will discuss considerations for key, block and tag sizes, and explore the topic of instantiating a pseudorandom permutation (PRP) with a non-ideal block cipher construction. This is inspired by the increasing prevalence of lightweight designs t...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
International audienceLightweight symmetric cryptography emerged thirty years ago with the prolifera...
The purpose of this thesis is to explore a number of techniques used in lightweight cryptography des...
We study the synthesis of small functions used as building blocks in lightweight cryptographic desig...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
International audienceLightweight symmetric cryptography emerged thirty years ago with the prolifera...
The purpose of this thesis is to explore a number of techniques used in lightweight cryptography des...
We study the synthesis of small functions used as building blocks in lightweight cryptographic desig...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...