2007
DOI: 10.1109/mdt.2007.178
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Lightweight-Cryptography Implementations

Abstract: &THE UPCOMING ERA of pervasive computing will be characterized by many smart devices that-because of the tight cost constraints inherent in mass deployments-have very limited resources in terms of memory, computing power, and battery supply. Here, it's necessary to interpret Moore's law differently: Rather than a doubling of performance, we see a halving of the price for constant computing power every 18 months. Because many foreseen applications have extremely tight cost constraints-for example, RFID in tetra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
196
0
5

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 385 publications
(201 citation statements)
references
References 9 publications
0
196
0
5
Order By: Relevance
“…Data for SEA, IDEA and Klein are taken from [19], [12] and [10], respectively. In some cases, code size estimates had to be made to fit our framework.…”
Section: B Comparison Data and Methodologymentioning
confidence: 99%
“…Data for SEA, IDEA and Klein are taken from [19], [12] and [10], respectively. In some cases, code size estimates had to be made to fit our framework.…”
Section: B Comparison Data and Methodologymentioning
confidence: 99%
“…Далее приводится сравнение отдельных блоч-ных шифров по таким параметрам, как размер кода и объем требуемой оперативной памяти [45]. Приводимые данные были получены для 8-раз-рядных микроконтроллеров типа AVR, которые являются распространённым семейством 8-раз-рядных RISC-микроконтроллеров.…”
Section: программная реализация блочных шифровunclassified
“…A well-designed encryption mechanism must be one with high security level to effectively protect a system from being attacked by hackers, and with high performance and low cost to efficiently perform encryption and decryption [14]. In the following, we will analyze FETDO mechanism and compare it with other cryptographic methods.…”
Section: Safety Analysis and Comparisonmentioning
confidence: 99%