The SIMON and SPECK lightweight block ciphers

R Beaulieu, D Shors, J Smith… - Proceedings of the …, 2015 - dl.acm.org
The Simon and Speck families of block ciphers were designed specifically to offer security
on constrained devices, where simplicity of design is crucial. However, the intended use …

SIMON and SPECK: Block Ciphers for the Internet of Things

R Beaulieu, D Shors, J Smith… - Cryptology ePrint …, 2015 - eprint.iacr.org
Abstract The US National Security Agency (NSA) developed the SIMON and SPECK families
of lightweight block ciphers as an aid for securing applications in very constrained …

Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems

I Miketic, K Dhananjay, E Salman - Sensors, 2023 - mdpi.com
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …

FPGA modeling and optimization of a SIMON lightweight block cipher

S Abed, R Jaffal, BJ Mohd, M Alshayeji - Sensors, 2019 - mdpi.com
Security of sensitive data exchanged between devices is essential. Low-resource devices
(LRDs), designed for constrained environments, are increasingly becoming ubiquitous …

Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes

A Singh, N Chawla, JH Ko, M Kar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Design of ultralightweight but secure encryption engine is a key challenge for Internet-of-
Things edge devices. This paper explores the system level design space for an ultralow …

High throughput and area‐efficient FPGA implementation of AES for high‐traffic applications

K Shahbazi, SB Ko - IET Computers & Digital Techniques, 2020 - Wiley Online Library
This study presents a high throughput field‐programmable gate array (FPGA)
implementation of advanced encryption standard‐128 (AES‐128). AES is a well‐known …

Cryptographically secure shields

JM Cioranesco, JL Danger, T Graba… - … Security and Trust …, 2014 - ieeexplore.ieee.org
Probing attacks are serious threats on integrated circuits. Security products often include a
protective layer called shield that acts like a digital fence. In this article, we demonstrate a …

Correlation power analysis of lightweight block ciphers: From theory to practice

A Biryukov, D Dinu, J Großschädl - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
Abstract Side-Channel Analysis (SCA) represents a serious threat to the security of millions
of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” …

Lightweight Side Channel Resistance: Threshold Implementations of Simon

A Shahverdi, M Taha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As networking has become major innovation driver for the Internet of Things as well as
Networks on Chips, the need for effective cryptography in hardware is on a steep rise. Both …

Secure authentication on the Internet of Things

PH Griffin - SoutheastCon 2017, 2017 - ieeexplore.ieee.org
This paper describes biometric-based cryptographic techniques for providing confidential
communications and strong, mutual and multifactor authentication on the Internet of Things …