A novel lightweight block cipher-based mutual authentication protocol for constrained environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ieeexplore.ieee.org
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

Privacy-friendly synchronized ultralightweight authentication protocols in the storm

G Avoine, X Carpent, B Martin - Journal of Network and Computer …, 2012 - Elsevier
In the recent years, there has been an increasing interest in the development of secure and
private authentication protocols for RFID. In order to suit the very lightweight nature of RFID …

Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks

M Khalid, U Mujahid… - International Journal of …, 2018 - journals.sagepub.com
Internet of Things is one of the most important components of modern technological systems.
It allows the real time synchronization and connectivity of devices with each other and with …

ZMAC: a fast tweakable block cipher mode for highly secure message authentication

T Iwata, K Minematsu, T Peyrin, Y Seurin - Annual international cryptology …, 2017 - Springer
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu… - … Hardware and Embedded …, 2017 - Springer
This paper presents a design of authenticated encryption (AE) focusing on minimizing the
implementation size, ie, hardware gates or working memory on software. The scheme is …

Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP

I Ahmed, A James, D Singh - Security and communication …, 2014 - Wiley Online Library
ABSTRACT CCM/CCMP is a two‐cycle authenticate and encrypt (AE) mode. One cycle is
used to perform confidentiality computations, and the second cycle is used to compute …

[PDF][PDF] A review of ultralightweight mutual authentication protocols

U Mujahid, G Unabia, H Choi, B Tran - Int J Electr Comput Eng, 2020 - academia.edu
Radio Frequency Identification (RFID) is one of the most commonly used technologies in
IoTs and Wireless Sensor Networks which makes the devices identification and tracking …

Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols

M Safkhani, S Rostampour, Y Bendavid… - Journal of Information …, 2022 - Elsevier
With the increase of connected devices being introduced into the market each day, the
Internet of Things (IoT) vision is progressively becoming a reality. This phenomenon …

A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP

U Mujahid, M Najam-ul-Islam, S Sarwar - Wireless Personal …, 2017 - Springer
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu, M Nandi - Journal of Cryptology, 2020 - Springer
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …