In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded ARM Cortex-M4 platform. Symmetric cryptographic algorithms can serve to protect the integrity and optionally, if supported by the algorithm, the confidentiality of data. A broad range of well-established algorithms exists, where the different algorithms typically have different properties and come with different computational complexity. On deeply embedded systems, the overhead imposed by cryptographic operations may be significant. We execute the algorithms AES-GCM, ChaCha20-Poly1305, HMAC-SHA256, KMAC, and SipHash on an STM32 embedded microcontroller and benchmark the execution times of the algorithms as a function of the input lengths
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
The aim of this thesis was to determine the execution times of different cryptographic algorithms in...
AbstractOver the last decades owing to the incredible boost in the electronics industry and wireless...
Cryptography is the study of mathematical techniques related to aspects of information security such...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Cryptography considered being the most vital component in information security because it is respons...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
This thesis analyzes the implementation and performance characterization of symmetric key block ciph...
Performance dataset of cryptographic algorithms running on the following embedded devices (results i...
The selection of a Lightweight Cryptography (LWC) algorithm is crucial for resource limited applicat...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
peer reviewedPermutation-based symmetric cryptography has become increasingly popular over the past ...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...
In this paper, we study the runtime performance of symmetric cryptographic algorithms on an embedded...
The aim of this thesis was to determine the execution times of different cryptographic algorithms in...
AbstractOver the last decades owing to the incredible boost in the electronics industry and wireless...
Cryptography is the study of mathematical techniques related to aspects of information security such...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Cryptography considered being the most vital component in information security because it is respons...
The main objective of this thesis is to examine the trade-offs between security and efficiency with...
This thesis analyzes the implementation and performance characterization of symmetric key block ciph...
Performance dataset of cryptographic algorithms running on the following embedded devices (results i...
The selection of a Lightweight Cryptography (LWC) algorithm is crucial for resource limited applicat...
The ever-increasing need for securing computing systems using cryptographic algorithms is spurring i...
peer reviewedPermutation-based symmetric cryptography has become increasingly popular over the past ...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
Current era is digital and has elite advancement in technology, almost in every field things are bec...
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Conselho Nacional de Desenvolvime...