Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream cipher family and is resistant to the most common attacks against stream ciphers. The software implementations of the WG-8 stream cipher on two popular low-power microcontrollers as well as the extensive comparison with other lightweight cryptography implementations highlight that in the context of securing lightweight embedded applications WG-8 has f...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
In this paper we compare two lightweight stream ciphers, MICKEY 2.0 and WG-8, which can be used for...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
In this paper we compare four lightweight stream ciphers, MICKEY 2.0, WG-8, Grain and Trivium, whic...
The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher fami...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This c...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...
In this paper we compare two lightweight stream ciphers, MICKEY 2.0 and WG-8, which can be used for...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (l...
Devices of extremely small computational power like RFID tags are used in practice to a rapidly grow...
In this paper we compare four lightweight stream ciphers, MICKEY 2.0, WG-8, Grain and Trivium, whic...
The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher fami...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This c...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In recent years there has been a wide-spread deployment of battery-powered and passive devices such ...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Resource-efficient cryptographic primitives become fundamental for realizing both security and effic...