2014
DOI: 10.1504/ijict.2014.063225
|View full text |Cite
|
Sign up to set email alerts
|

RC5 implementation in ARM platform for cryptographic applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In the application of the Internet of Things, considering the limited resources of terminal nodes, its security research has always focused on lightweight encryption algorithms that occupy less resources [18][19], such as RC5, Skipjack, TEA, and improved algorithms based on AES. Among them, RC5 algorithm has an obvious deficiency, which takes up a large amount of storage space when it performs key initialization [20]. Although Skipjack algorithm meets the requirement that NB-IOT encrypted data should not be too long, its security level is low [21].…”
Section: Lightweight Encryption Algorithmmentioning
confidence: 99%
“…In the application of the Internet of Things, considering the limited resources of terminal nodes, its security research has always focused on lightweight encryption algorithms that occupy less resources [18][19], such as RC5, Skipjack, TEA, and improved algorithms based on AES. Among them, RC5 algorithm has an obvious deficiency, which takes up a large amount of storage space when it performs key initialization [20]. Although Skipjack algorithm meets the requirement that NB-IOT encrypted data should not be too long, its security level is low [21].…”
Section: Lightweight Encryption Algorithmmentioning
confidence: 99%