Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications

V Bhagat, S Kumar, SK Gupta… - … Practice and Experience, 2023 - Wiley Online Library
Lightweight cryptography is a rapidly developing research field. Its main goal is to provide
security for devices with fewer resources. These limited‐resource devices implement …

Secure Firmware Update: Challenges and Solutions

L Catuogno, C Galdi - Cryptography, 2023 - mdpi.com
The pervasiveness of IoT and embedded devices allows the deployment of services that
were unthinkable only few years ago. Such devices are typically small, run unattended …

Modified lightweight cryptography scheme and its applications in IoT environment

N Yasmin, R Gupta - International Journal of Information Technology, 2023 - Springer
Interconnected devices have been with us for a long time. The security of the data
exchanged through these devices is a matter of grave concern. While exchanging …

A homomorphic AES evaluation in less than 30 seconds by means of TFHE

D Trama, PE Clet, A Boudguiga, R Sirdey - Proceedings of the 11th …, 2023 - dl.acm.org
Since the pioneering work of Gentry, Halevi, and Smart in 2012\citegentry_BGV, the state of
the art on transciphering has moved away from work on AES to focus on new symmetric …

At last! a homomorphic aes evaluation in less than 30 seconds by means of tfhe

D Trama, PE Clet, A Boudguiga, R Sirdey - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Since the pioneering work of Gentry, Halevi, and Smart in 2012, the state of the art on
transciphering has moved away from work on AES to focus on new symmetric algorithms …

A lightweight and secure communication protocol for the IoT environment

Z Ding, D He, Q Qiao, X Li, Y Gao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Ensuring secure communications for the Internet of Things (IoT) systems remains a
challenge. Due to exacting resource limitations of computing, memory, and communication …

IOLock: An Input/Output Locking Scheme for Protection Against Reverse Engineering Attacks

C Vega, P Slpsk, S Bhunia - IEEE Transactions on Very Large …, 2023 - ieeexplore.ieee.org
Reverse engineering (RE) of hardware designs poses a significant threat to the modern
distributed electronics supply chain. RE can be performed at both chip and printed circuit …

A new construction method for keystream generators

Ç Gül, O Kara - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
We introduce a new construction method of diffusion layers for Substitution Permutation
Network (SPN) structures along with its security proofs. The new method can be used in …

From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers

J Lin, J He, Y Fan, M Wang - International Conference on Cryptology in …, 2023 - Springer
Low energy is an important aspect of hardware implementation. For energy-limited battery-
powered devices, low energy stream ciphers can play an important role. In IACR ToSC …

A new correlation cube attack based on division property

C Che, T Tian - Australasian Conference on Information Security and …, 2023 - Springer
Correlation cube attacks were proposed by Liu et al. at EUROCRYPT 2018, which targeted
a modern symmetric-key cryptosystem based on nonlinear feedback shift registers. The …