A survey of lightweight stream ciphers for embedded systems

C Manifavas, G Hatzivasilis, K Fysarakis… - Security and …, 2016 - Wiley Online Library
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

Grain: a stream cipher for constrained environments

M Hell, T Johansson, W Meier - International journal of …, 2007 - inderscienceonline.com
A new stream cipher, Grain, is proposed. The design targets hardware environments where
gate count, power consumption and memory is very limited. It is based on two shift registers …

Sosemanuk, a Fast Software-Oriented Stream Cipher

C Berbain, O Billet, A Canteaut, N Courtois… - New Stream Cipher …, 2008 - Springer
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile
1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and …

Universally composable and forward-secure RFID authentication and authenticated key exchange

T Van Le, M Burmester, B de Medeiros - … of the 2nd ACM symposium on …, 2007 - dl.acm.org
Recently, a universally composable framework for RFID authentication protocols providing
availability, anonymity, and authenticity was proposed. In this paper we extend that …

Hardware stream cipher with controllable chaos generator for colour image encryption

ML Barakat, AS Mansingka, AG Radwan… - IET image …, 2014 - Wiley Online Library
This study presents hardware realisation of chaos‐based stream cipher utilised for image
encryption applications. A third‐order chaotic system with signum non‐linearity is …

Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches

D Yamamoto, K Sakiyama, M Iwamoto, K Ohta… - … and Embedded Systems …, 2011 - Springer
Abstract Physical Unclonable Functions (PUFs) are expected to represent an important
solution for secure ID generation and authentication etc. In general, PUFs are considered to …

[PDF][PDF] RFID security: attacks, countermeasures and challenges

M Burmester, B De Medeiros - The 5th RFID academic convocation, the …, 2007 - cs.fsu.edu
Low-cost RFID tags are already being used for supply chain management and are a
promising new technology that can be used to support the security of wireless ubiquitous …

Universally composable RFID identification and authentication protocols

M Burmester, T Van Le, B De Medeiros… - ACM Transactions on …, 2009 - dl.acm.org
As the number of RFID applications grows, concerns about their security and privacy
become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature …

[HTML][HTML] Variety enhancement of PUF responses using the locations of random outputting RS latches

D Yamamoto, K Sakiyama, M Iwamoto, K Ohta… - Journal of Cryptographic …, 2013 - Springer
Abstract Physical Unclonable Functions (PUFs) are expected to represent an important
solution for secure ID generation and authentication etc. In general, manufactured PUFs are …