Lightweight cryptographic algorithms on resource-constrained devices

TX Meng, W Buchanan - 2020 - preprints.org
As the embedded device and internet of things (IoTs) concept prevalent in today's world,
there is an increasing demand for the security and performance requirements on deploying …

Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications

V Bhagat, S Kumar, SK Gupta… - … Practice and Experience, 2023 - Wiley Online Library
Lightweight cryptography is a rapidly developing research field. Its main goal is to provide
security for devices with fewer resources. These limited‐resource devices implement …

A comparative survey on lightweight block ciphers for resource constrained applications

P Singh, B Acharya… - International Journal of …, 2019 - inderscienceonline.com
Information security for low-resource devices has received a fair amount of attention in
recent years. These devices have physical constraint in terms of area, power, and memory …

A survey on lightweight cryptographic algorithms

S Sallam, BD Beheshti - TENCON 2018-2018 IEEE Region 10 …, 2018 - ieeexplore.ieee.org
The emergence of Internet of Things (IoT) devices is challenging the conventional design
targets for integrated systems such as energy efficiency, cost, noise, and performance. With …

On the efficiency of software implementations of lightweight block ciphers from the perspective of programming languages

AR Raza, K Mahmood, MF Amjad, H Abbas… - Future Generation …, 2020 - Elsevier
Lightweight block ciphers are primarily designed for resource constrained devices.
However, due to service requirements of large-scale IoT networks and systems, the need for …

Lightweight cryptography methods

WJ Buchanan, S Li, R Asif - Journal of Cyber Security Technology, 2017 - Taylor & Francis
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …

Lightweight cryptography for embedded systems–a comparative analysis

C Manifavas, G Hatzivasilis, K Fysarakis… - … Workshop on Data …, 2013 - Springer
As computing becomes pervasive, embedded systems are deployed in a wide range of
domains, including industrial systems, critical infrastructures, private and public spaces as …

[PDF][PDF] Performance analysis of CLEFIA, PICCOLO, TWINE Lightweight block ciphers in IoT environment

L Ertaul, SK Rajegowda - Proceedings of the International …, 2017 - mcs.csueastbay.edu
With the rapid evolution of Internet of Things, there increased a necessity for strong data
security crypto ciphers which would operate successfully in constrained device …

Triathlon of lightweight block ciphers for the internet of things

D Dinu, YL Corre, D Khovratovich, L Perrin… - Journal of Cryptographic …, 2019 - Springer
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on
a multitude of embedded platforms. Our framework is able to evaluate the execution time …

A survey on lightweight ciphers for IoT devices

MA Philip - … on technological advancements in power and …, 2017 - ieeexplore.ieee.org
Embedded systems are found to be used in a wide range of domains. But the inherent
limitations of size, memory and power, limits its functionality in secure transmission of …