In the bachelor thesis Lightweight cryptography I describe the basics of light cryptography, analyze and compare selected lightweight symmetric ciphers. Lightweight is about trade-off between low-cost, security and performace. There are many lightweight ciphers designes, therefore I chose nad explored some of those from the point of view of their features, hardware implementation, performance and security. Analyzed ciphers are in total of fifteen and include E0, A5/1, GRAIN, Trivium, LED, SKINNY, RECTANGLE, SPARX, mCrypton, PRESENT, SIMON and SPECK, XTEA, SEA, LBlock and CLEFIA. I have come to the conclusion that the stream cipher GRAIN is very fast and safe. Block ciphers LED and SKINNY are well secured and SIMON and PRESENT hardware-effic...
In 2016 the National Institute of Standards and Technology (NIST) started the stan- dardization proc...
Lightweight block cipher algorithms are very important for constraint environment. This paper analys...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
V bakalářské práci Lehká kryptografie popisuji základy lehké kryptografie, dále analyzuji a srovnává...
This bachelor thesis focuses on lightweight cryptography. The main focus is on block ciphers PRESENT...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
This bachelor thesis deals with the topic of lightweight cryptography and the implementation of a se...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
Lightweight cryptography has been one of the hot topics in symmetric cryptography in the recent ye...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
In 2016 the National Institute of Standards and Technology (NIST) started the stan- dardization proc...
Lightweight block cipher algorithms are very important for constraint environment. This paper analys...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
V bakalářské práci Lehká kryptografie popisuji základy lehké kryptografie, dále analyzuji a srovnává...
This bachelor thesis focuses on lightweight cryptography. The main focus is on block ciphers PRESENT...
One of the ways to provide information security is cryptography. Traditionally, cryptographic opera...
This bachelor thesis deals with the topic of lightweight cryptography and the implementation of a se...
The main objective of this chapter is to offer to practitioners, researchers and all interested part...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic a...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
This research dealt with three problems; First, it is difficult to optimized three factors at same t...
Lightweight cryptography has been one of the hot topics in symmetric cryptography in the recent ye...
Although the AES is an excellent and preferred choice for almost all block cipher applications, it i...
Lightweight cryptography has been a rising topic along with the global development of very constrain...
In 2016 the National Institute of Standards and Technology (NIST) started the stan- dardization proc...
Lightweight block cipher algorithms are very important for constraint environment. This paper analys...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...