Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
PRESENT: An ultra-lightweight block cipher
With the establishment of the AES the need for new block ciphers has been greatly
diminished; for almost all block cipher applications the AES is an excellent and preferred …
diminished; for almost all block cipher applications the AES is an excellent and preferred …
The LED block cipher
We present a new block cipher LED. While dedicated to compact hardware implementation,
and offering the smallest silicon footprint among comparable block ciphers, the cipher has …
and offering the smallest silicon footprint among comparable block ciphers, the cipher has …
Piccolo: An Ultra-Lightweight Blockcipher
K Shibutani, T Isobe, H Hiwatari, A Mitsuda… - … and Embedded Systems …, 2011 - Springer
We propose a new 64-bit blockcipher Piccolo supporting 80 and 128-bit keys. Adopting
several novel design and implementation techniques, Piccolo achieves both high security …
several novel design and implementation techniques, Piccolo achieves both high security …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved
by protocols assuming that an on-tag hash function is available. In this article we present the …
by protocols assuming that an on-tag hash function is available. In this article we present the …
Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …
rendered insecure by Shor's algorithm when large-scale quantum computers are built …
[PDF][PDF] Report on light weight cryptography
K McKay - 2016 - gocs.com.de
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …
purpose computers. In recent years, there has been increased deployment of small …