A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …
a fair amount of research for their essential security role in low-resource devices. Our …
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines;
they must be carefully considered without reducing the major role of classical design …
they must be carefully considered without reducing the major role of classical design …
One round cipher algorithm for multimedia IoT devices
With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues
have emerged as critical challenges that can potentially compromise their successful …
have emerged as critical challenges that can potentially compromise their successful …
The design of scalar AES instruction set extensions for RISC-V
Secure, efficient execution of AES is an essential requirement on most computing platforms.
Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a …
Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a …
How secure is your cache against side-channel attacks?
Security-critical data can leak through very unexpected side channels, making side-channel
attacks very dangerous threats to information security. Of these, cache-based side-channel …
attacks very dangerous threats to information security. Of these, cache-based side-channel …
Intel's new AES instructions for enhanced performance and security
S Gueron - International Workshop on Fast Software Encryption, 2009 - Springer
Abstract The Advanced Encryption Standard (AES) is the Federal Information Processing
Standard for symmetric encryption. It is widely believed to be secure and efficient, and is …
Standard for symmetric encryption. It is widely believed to be secure and efficient, and is …
Protecting AES software implementations on 32-bit processors against power analysis
S Tillich, C Herbst, S Mangard - … , ACNS 2007, Zhuhai, China, June 5-8 …, 2007 - Springer
Abstract The Advanced Encryption Standard is used in many embedded devices to provide
security. In the last years, several researchers have proposed to enhance general-purpose …
security. In the last years, several researchers have proposed to enhance general-purpose …
Simple estimators for relational bayesian classifiers
We present the relational Bayesian classifier (RBC), a modification of the simple Bayesian
classifier (SBC) for relational data. There exist several Bayesian classifiers that learn …
classifier (SBC) for relational data. There exist several Bayesian classifiers that learn …
Speck-R: An ultra light-weight cryptographic scheme for Internet of Things
Lightweight cryptography (LWC) is an interesting research area in the field of information
security. Some limitations like: increased components usage, time consumption, power …
security. Some limitations like: increased components usage, time consumption, power …