Security of Ubiquitous Computing Systems 2021
DOI: 10.1007/978-3-030-10591-4_2
|View full text |Cite
|
Sign up to set email alerts
|

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives

Abstract: The main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main cryptographic features, ultimate hardware performance, and existing security analysis, so they can easily compare the ciphers or choose some of them according to their needs. Certain security evaluation issues have been addressed as well. In particular, the reason behind why modern lightweight block cipher designs have i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 140 publications
0
3
0
Order By: Relevance
“…There are five categories of lightweight cryptography components: block and stream ciphers, hash algorithms, message authentication codes, and authenticated encryption algorithms. [115]. Figure 6 shows the categories and subcategories of lightweight cryptography, and Table 10 presents a Comparative Study on these Algorithms.…”
Section: E Lightweight Encryptionmentioning
confidence: 99%
“…There are five categories of lightweight cryptography components: block and stream ciphers, hash algorithms, message authentication codes, and authenticated encryption algorithms. [115]. Figure 6 shows the categories and subcategories of lightweight cryptography, and Table 10 presents a Comparative Study on these Algorithms.…”
Section: E Lightweight Encryptionmentioning
confidence: 99%
“…The RDI is serially shifted to the LUT on clock edge and high En whereas the old value is depleted from LUT through RDO. The RDI of RLUTs may comprise of the output values of existing LUTs and thus can be connected in cascaded form [ 25 ]. This methodology reconfigures the LUTs internally i.e.…”
Section: Rlut Dpr and Review Of Misty1 / Kasumi Algorithmsmentioning
confidence: 99%
“…and thus can be connected in cascaded form [25]. This methodology reconfigures the LUTs internally i.e.…”
Section: Plos Onementioning
confidence: 99%
See 1 more Smart Citation
“…Various types of so-called primitive structures are used to describe protocol specifications [49,50]. Each of these structures, to a greater or lesser extent, differs from the others regarding the scope of information stored and how to implement specific functionalities.…”
Section: Primary Structures and Generalization Of The Problemmentioning
confidence: 99%