Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant impact on existing industries, such as smart factories, smart cars, and smart cities. Massive learning and computing using data collected through the IoT are also being actively performed in these industries. Therefore, the security of low-end microcontrollers used in the Internet of Things should be highly considered due to their importance. Simpira Permutation is a Permutation design using the AES algorithm designed to run efficiently on 64-bit high-end processors. With the efficient implementation of Simpira algorithm, we can ensure secure massive learning in IoT devices without performance bottleneck. In nature, Simpira exploited the part of AES ...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
The U.S. National Institute of Standards and Technology is currently undertaking a process to evalua...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
International audienceThis paper introduces Simpira, a family of cryptographic permutations that sup...
Internet of Things (IoT) is the network of objects, or “things”, that are embedded with electronics ...
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characte...
As the Internet of Things is used in various fields, Internet of Things security has become importan...
Lightweight cryptography is gaining momentum as the number of connected Internet of Things (IoT) dev...
Graduation date: 2004The Advanced Encryption Standard (AES) is the new standard for cryptography\ud ...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Rijndael is the winner algorithm of the AES contest; therefore it should become the most used symmet...
The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded...
The widespread use of the internet of things (IoT) is due to the value of the data collected by IoT ...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
The rapid growth of the Internet of Things (IoT) and its applications requires high computational ef...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
The U.S. National Institute of Standards and Technology is currently undertaking a process to evalua...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...
International audienceThis paper introduces Simpira, a family of cryptographic permutations that sup...
Internet of Things (IoT) is the network of objects, or “things”, that are embedded with electronics ...
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main characte...
As the Internet of Things is used in various fields, Internet of Things security has become importan...
Lightweight cryptography is gaining momentum as the number of connected Internet of Things (IoT) dev...
Graduation date: 2004The Advanced Encryption Standard (AES) is the new standard for cryptography\ud ...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Rijndael is the winner algorithm of the AES contest; therefore it should become the most used symmet...
The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded...
The widespread use of the internet of things (IoT) is due to the value of the data collected by IoT ...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
The rapid growth of the Internet of Things (IoT) and its applications requires high computational ef...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
The U.S. National Institute of Standards and Technology is currently undertaking a process to evalua...
Cryptographic algorithms, like the Advanced Encryption Standard, are frequently used in todays elect...