International audienceOver the past 10 years, the multitude of highly constrained applications such as radio-frequency identification and sensor networks has led to a new trend in the development of cryptographic primitives. Many algorithms categorized as lightweight cryptographic algorithms have been developed specifically for these new applications. Comparing them is very important but also very challenging because every application has its own constraints. This fact leads to a different choice of design strategies, and the best algorithm for one application is not necessarily the best for all applications. Moreover, the definition of what is lightweight is not always the same because lightweight covers a reduction in power and energy con...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
We provide a comprehensive evaluation of several lightweight block ciphers with respect to various h...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
In recent years more and more security sensitive applications use passive smart devices such as cont...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide ...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
We provide a comprehensive evaluation of several lightweight block ciphers with respect to various h...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
In recent years more and more security sensitive applications use passive smart devices such as cont...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
International audienceLightweight cryptography has recently emerged as a strong requirement for any ...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Lightweight block ciphers are an important topic in the Internet of Things (IoT) since they provide ...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Power analysis presents the typical example of successful attacks against trusted cryptographic devi...
We provide a comprehensive evaluation of several lightweight block ciphers with respect to various h...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...