International audienceCryptographic algorithms that can provide both encryption and authentication are increasingly required in modern security architectures and protocols (e.g. TLS v1.3). Many authenticated encryption systems have been proposed in the past few years, which has resulted in several cryptanalysis research work. In this same direction, the National Institute of Standards and Technology (NIST) is coordinating a large effort to find a new standard authenticated encryption algorithm to be used by resource-constrained and limited devices. In this paper, 12 algorithms of the 33 candidates of the Round 2 phase from NIST competition are being benchmarked on a real IoT test-bed. These 33 ciphers implement authenticated encryption with...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new con...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The Internet of Things (IoT) combines many devices with various platforms, computing capabilities an...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characte...
IoT networks serve as a way for various devices interconnected over the internet to exchange data wi...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new con...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The Internet of Things (IoT) combines many devices with various platforms, computing capabilities an...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characte...
IoT networks serve as a way for various devices interconnected over the internet to exchange data wi...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
With predictions suggesting there will be 18 billion Internet of Things (IoT) devices live by 2022, ...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new con...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...