Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

Zero correlation linear cryptanalysis with reduced data complexity

A Bogdanov, M Wang - … Workshop, FSE 2012, Washington, DC, USA …, 2012 - Springer
Zero correlation linear cryptanalysis is a novel key recovery technique for block ciphers
proposed in [5]. It is based on linear approximations with probability of exactly 1/2 (which …

Lightweight block cipher for resource constrained iot environment—an survey, performance, cryptanalysis and research challenges

M Abinaya, S Prabakeran - IoT Based Control Networks and Intelligent …, 2022 - Springer
Abstract Nowadays IoT (Internet of Things) is becoming a more popular environment and
has a variety of applications like Smart Home, Smart Healthcare, Vehicles, and many …

Security analysis of the lightweight block ciphers XTEA, LED and Piccolo

T Isobe, K Shibutani - Information Security and Privacy: 17th Australasian …, 2012 - Springer
In this paper, we investigate the security of the lightweight block ciphers against the meet-in-
the-middle (MITM) attack. Since the MITM attack mainly exploits low key-dependency in a …

Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT

J Chen, M Wang, B Preneel - … Conference on Cryptology in Africa, Ifrance …, 2012 - Springer
Abstract TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-
bit keys. The round functions of the three ciphers are based on the simple operations XOR …

Lightweight cryptography for IoT: A state-of-the-art

VA Thakor, MA Razzaque, MRA Khandaker - arxiv preprint arxiv …, 2020 - arxiv.org
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for
almost all industries due to its wide range of applications from various domains. The …

CSL: FPGA implementation of lightweight block cipher for power-constrained devices

HS Lamkuche, D Pramod - International Journal of …, 2020 - inderscienceonline.com
The exploration of interconnected devices, embedded devices, sensors, and various
network-connected devices helps to communicate each other and exchange …

Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)

L Wei, C Rechberger, J Guo, H Wu, H Wang… - Information Security and …, 2011 - Springer
This paper presents ongoing work towards extensions of meet-in-the-middle (MITM) attacks
on block ciphers. Exploring developments in MITM attacks in hash analysis such as:(i) the …

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others

S Wu, D Feng, W Wu, J Guo, L Dong, J Zou - … DC, USA, March 19-21, 2012 …, 2012 - Springer
The Grøstl hash function is one of the 5 final round candidates of the SHA-3 competition
hosted by NIST. In this paper, we study the preimage resistance of the Grøstl hash function …

An analysis of lightweight cryptographic algorithms for IoT-Applications

JA Chauhan, AR Patel, S Parikh, N Modi - International Conference on …, 2022 - Springer
With the arrival of advanced technologies, IoT has enabled the connection of many devices
that can collect huge amounts of data. IoT security requirements are therefore supreme …