2020
DOI: 10.20944/preprints202009.0302.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Lightweight Cryptographic Algorithms on Resource-Constrained Devices

Abstract: As the embedded device and internet of things (IoTs) concept prevalent in today's world, there is an increasing demand for the security and performance requirements on deploying these devices to private and public sectors. The crucial part of it is to protect privacy, confidentiality and integrity, meanwhile, maintain an adequate level of performance during transmission, storage and access of critical information. While the conventional cryptography methods, such as the Advanced Encryption Standard (AES), SHA$… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 36 publications
(46 reference statements)
0
2
0
Order By: Relevance
“…There are many LWC in security for constraint devices like (advanced encryption standard (AES), rivest's cipher 5 (RC5), PRESENT, Simon, Speck, high security and lightweight (HIGHT), lightweight encryption algorithm (LEA), tiny encryption algorithm (TEA), and KATAN) [11]. However, it differs in terms of memory and power consumption, and security, which is the most crucial factor.…”
Section: Introductionmentioning
confidence: 99%
“…There are many LWC in security for constraint devices like (advanced encryption standard (AES), rivest's cipher 5 (RC5), PRESENT, Simon, Speck, high security and lightweight (HIGHT), lightweight encryption algorithm (LEA), tiny encryption algorithm (TEA), and KATAN) [11]. However, it differs in terms of memory and power consumption, and security, which is the most crucial factor.…”
Section: Introductionmentioning
confidence: 99%
“…Model compression is widely‐used for memory saving and computation acceleration. There are a wide variety of model compression techniques, 8‐10 including network pruning, knowledge distillation, low‐rank decomposition, parameter quantization, and architecture design. Network pruning starts with a complete neural network with its full set of parameters, and iteratively identifies and removes the least important parameters.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…By the end of 2020, it is estimated that more than 18 billion IoT devices would be on the market and connected through the cloud, with more than half of them for industrial uses [1]. As technology connects a lot of devices through the Internet, hacking them can have a big loss, such as losing sensitive personal and economic information, when user's lack of knowledge about how to work with these devices and the potential risks to personal information due to misuse.…”
Section: Introductionmentioning
confidence: 99%