Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V

A Adomnicai, T Peyrin - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
The fixslicing implementation strategy was originally introduced as a new representation for
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …

DEFAULT: Cipher-level resistance against differential fault attack

A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Abstract Differential Fault Analysis (DFA) is a well-known cryptanalytic technique that
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …

RISC-V instruction set extensions for lightweight symmetric cryptography

H Cheng, J Großschädl, B Marshall, D Page… - IACR Transactions on …, 2023 - tches.iacr.org
Abstract The NIST LightWeight Cryptography (LWC) selection process aims to standardise
cryptographic functionality which is suitable for resource-constrained devices. Since the …

Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers

J Feng, Y Wei, F Zhang, E Pasalic… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An optimized implementation of S-boxes has a significant impact on the performance of
cryptographic primitives. SAT-based methods can find optimal implementations for …

Cryptography and Embedded Systems Security

X Hou, J Breier - Springer, 2024 - Springer
Cryptography is an indispensable tool used to protect information in computing systems.
Billions of people all over the world use it in their daily lives without even noticing there is …

[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm

A Jha, M Khairallah, M Nandi, A Saha - … on the Theory and Applications of …, 2024 - Springer
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …

Accelerating the best trail search on AES-like ciphers

S Kim, D Hong, J Sung, S Hong - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In this study, we accelerate Matsui's search algorithm to search for the best differential and
linear trails of AES-like ciphers. Our acceleration points are twofold. The first exploits the …