A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip

L Bossuet, M Grand, L Gaspar, V Fischer… - ACM Computing …, 2013 - dl.acm.org
Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines;
they must be carefully considered without reducing the major role of classical design …

One round cipher algorithm for multimedia IoT devices

H Noura, A Chehab, L Sleem, M Noura… - Multimedia tools and …, 2018 - Springer
With the exponential growth in Internet-of-Things (IoT) devices, security and privacy issues
have emerged as critical challenges that can potentially compromise their successful …

The design of scalar AES instruction set extensions for RISC-V

B Marshall, GR Newell, D Page… - IACR …, 2021 - moving-the-social.ub.rub.de
Secure, efficient execution of AES is an essential requirement on most computing platforms.
Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a …

How secure is your cache against side-channel attacks?

Z He, RB Lee - Proceedings of the 50th Annual IEEE/ACM …, 2017 - dl.acm.org
Security-critical data can leak through very unexpected side channels, making side-channel
attacks very dangerous threats to information security. Of these, cache-based side-channel …

Intel's new AES instructions for enhanced performance and security

S Gueron - International Workshop on Fast Software Encryption, 2009 - Springer
Abstract The Advanced Encryption Standard (AES) is the Federal Information Processing
Standard for symmetric encryption. It is widely believed to be secure and efficient, and is …

Protecting AES software implementations on 32-bit processors against power analysis

S Tillich, C Herbst, S Mangard - … , ACNS 2007, Zhuhai, China, June 5-8 …, 2007 - Springer
Abstract The Advanced Encryption Standard is used in many embedded devices to provide
security. In the last years, several researchers have proposed to enhance general-purpose …

Simple estimators for relational bayesian classifiers

J Neville, D Jensen, B Gallagher - Third IEEE International …, 2003 - ieeexplore.ieee.org
We present the relational Bayesian classifier (RBC), a modification of the simple Bayesian
classifier (SBC) for relational data. There exist several Bayesian classifiers that learn …

Speck-R: An ultra light-weight cryptographic scheme for Internet of Things

L Sleem, R Couturier - Multimedia Tools and Applications, 2021 - Springer
Lightweight cryptography (LWC) is an interesting research area in the field of information
security. Some limitations like: increased components usage, time consumption, power …