2018
DOI: 10.1007/978-3-319-97749-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Recently, lightweight cryptosystems were introduced as consisting of lightweight cryptographic algorithms and lightweight hash functions. Firstly, the lightweight cryptographic algorithms (LCA) offer different level of security and effectiveness as mention by [26]. The details of recent LCA are presented in Table 1.…”
Section: Related Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, lightweight cryptosystems were introduced as consisting of lightweight cryptographic algorithms and lightweight hash functions. Firstly, the lightweight cryptographic algorithms (LCA) offer different level of security and effectiveness as mention by [26]. The details of recent LCA are presented in Table 1.…”
Section: Related Studiesmentioning
confidence: 99%
“…In Table 1, the study in [26] revealed that the Speck is best for minimal storage space, the Rectangle is desirable for speed of processing, and the Present is most secured for resource-constraint or IoT devices especially Arduino UNO and Raspberry Pi model B. The asymmetric lightweight algorithms (such as Elliptic Curve Cryptography (ECC)) utilize a smaller key size, which could be applicable in IoT (nodes in 6LoWPAN) for fast speed, lesser memory space and real-time processing.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2018, Tasnime Omrani, Rhouma Rhouma, and Layth Sliman in their article [14] analyses several popular lightweight ciphers on the IoT devices include Raspberry Pi and Arduino UNO. Their performance metrics are RAM and ROM consumption as well as execution time and security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Regarding to the security level and vulnerability of LW ciphers, there are 3 general criterion adopted in [14] as:…”
Section: Algorithmmentioning
confidence: 99%