2012
DOI: 10.1007/978-3-642-31410-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices

Abstract: Abstract. The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which implementations of different ciphers actually reach their low-cost goals on various platforms. This paper reports on an initiative aiming to relax this issue. First, we provide implementations of 12 block ciphers on an ATMEL AVR ATtiny45 8-bit microcontroller, and make the corresponding source code avai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
86
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 103 publications
(88 citation statements)
references
References 15 publications
0
86
0
2
Order By: Relevance
“…Camellia [33], IDEA [34], KASUMI [34] and Blowfish are other widely used ciphers. In PHC, AES and Blowfish are mainly utilized for cryptographic operations.…”
Section: Lightweight Cryptographic Mechanismsmentioning
confidence: 99%
“…Camellia [33], IDEA [34], KASUMI [34] and Blowfish are other widely used ciphers. In PHC, AES and Blowfish are mainly utilized for cryptographic operations.…”
Section: Lightweight Cryptographic Mechanismsmentioning
confidence: 99%
“…For operations in F 2 128 (addition and multiplication) we have selected the same irreducible polynomial x 128 + x 7 + x 2 + x + 1 as stated in [27]. The implementation of the block cipher NOEKEON is based on the open source version published in [14], but the decryption functionality has been removed since it is not required for the generation of a permutations. Two variants of the Rogaway-Steinberger scheme have been implemented: LP362 and lp362.…”
Section: Block Cipher-based Constructionsmentioning
confidence: 99%
“…Hence, the two encryptions need to be processed in parallel. The AES design is similar to the one presented in [14], with a further optimized Shift Rows operation. Decryption code is not needed and has been removed.…”
Section: Block Cipher-based Constructionsmentioning
confidence: 99%
See 2 more Smart Citations