Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a ``lightweight'' algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (\nist{}...) and international (\textsc{iso/iec}...) standards are listed. We then discuss some trends we identified in the design of lightweight al...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
International audienceLightweight symmetric cryptography emerged thirty years ago with the prolifera...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent ...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
International audienceLightweight symmetric cryptography emerged thirty years ago with the prolifera...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographi...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Symmetric key cryptographic primitives are essential to encrypt data and protect communication betwe...
The selection criteria for NIST\u27s Lightweight Crypto Standardization (LWC) have been slowly shift...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...