A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases
Information and Computation
Elliptic curve cryptography on smart cards without coprocessors
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Hardware architectures for public key cryptography
Integration, the VLSI Journal
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Breaking ciphers with COPACOBANA –a cost-optimized parallel code breaker
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Energy and Performance Evaluation of an FPGA-Based SoC Platform with AES and PRESENT Coprocessors
SAMOS '08 Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation
Unclonable Lightweight Authentication Scheme
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
BEAN: a lightweight stream cipher
Proceedings of the 2nd international conference on Security of information and networks
TWIS --- A Lightweight Block Cipher
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Securing every bit: authenticated broadcast in radio networks
Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Lightweight cryptography and RFID: tackling the hidden overheads
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Conflict on a communication channel
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Compact implementation and performance evaluation of block ciphers in ATtiny devices
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A lightweight framework for secure life-logging in smart environments
Information Security Tech. Report
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Object protection in distributed systems
Journal of Parallel and Distributed Computing
CLIP: circuit level IC protection through direct injection of process variations
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hardware Cost Measurement of Lightweight Security Protocols
Wireless Personal Communications: An International Journal
Peer-to-peer architectures for massively multiplayer online games: A Survey
ACM Computing Surveys (CSUR)
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
Analyzing and comparing the AES architectures for their power consumption
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
The upcoming pervasive computing age will lead to an increased demand for security for applications ranging from RFIDs and smart cards to mobile devices. Lightweight cryptography is a key tool for building strong security solutions for pervasive devices. Due to the tight cost constraints of such extremely high-volume applications, efficient hardware and software implementations of cryptographic algorithms are of the utmost importance to realize the vision of pervasive computing. However, the computational complexity inherent in ciphers poses a major challenge. This article presents a selection of recently published lightweight cryptographic implementations and compares them to state-of-the-art results in the field. This survey covers recent hardware and software implementations of both symmetric and asymmetric ciphers.