We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-9 of 9 results
  1. Statistical Fault Analysis of TinyJambu

    The resource-constrained IoT devices have limited resources such as processing power, memory, and battery capacity. Therefore it is challenging to...

    Iftekhar Salam, Janaka Alawatugoda, Hasindu Madushan in Discover Applied Sciences
    Article Open access 06 February 2024
  2. Software Implementation and Benchmarking of TinyJAMBU on Programmable Logic Controllers

    As of March 2021, TinyJAMBU is one of the 12 finalists in the National Institute of Standards and Technology (NIST) competition launched to...
    Conference paper 2023
  3. Reducing the Security Margin Against a Differential Attack in the TinyJambu Cryptosystem

    TinyJambu is one the 10 finalists in the NIST Lightweight Cryptography (LWC) Standardization Project. This Authenticated Encryption with Associated...
    Conference paper 2023
  4. Benchmarking of lightweight cryptographic algorithms for wireless IoT networks

    Cryptographic algorithms that can provide both encryption and authentication are increasingly required in modern security architectures and protocols...

    Soline Blanc, Abdelkader Lahmadi, ... Lama Sleem in Wireless Networks
    Article 22 July 2022
  5. Hardware Design Space Exploration of a Selection of NIST Lightweight Cryptography Candidates

    Round 2 of the NIST lightweight cryptography standardization project lasted till 29 March, 2021 and resulted in the selection of 10 candidates as the...
    Chapter 2022
  6. The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers

    In this work, we present our benchmarking results for the ten finalist ciphers of the Lightweight Cryptography (LWC) project initiated by National...
    Sebastian Renner, Enrico Pozzobon, Jürgen Mottok in Attacks and Defenses for the Internet-of-Things
    Conference paper 2022
  7. Introduction: Emergence of Quantum Computing

    This chapter presents the role of cryptography in securing our electronic communications. Thereafter, the emerging threat of quantum computers are...
    Chapter 2024
  8. State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility

    In recent years, mobility systems have been steadily improving their performance in terms of connectivity, allowing road users to communicate among...
    Conference paper 2023
  9. Quantum Implementation and Resource Estimate for RECTANGLE and KNOT

    In this chapter, we target the lightweight block cipher RECTANGLE and the Authenticated Encryption with Associated Data (AEAD) KNOT which is based on...
    Chapter 2024
Did you find what you were looking for? Share feedback.