2017 International Conference on Big Data, IoT and Data Science (BID) 2017
DOI: 10.1109/bid.2017.8336586
|View full text |Cite
|
Sign up to set email alerts
|

ANU-II: A fast and efficient lightweight encryption design for security in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…The NIST test suite [10,27] has been used to assess the randomness of several cryptographic algorithms [28][29][30][31]. The competition process for selecting the AES involves a rigorous series of randomness evaluations.…”
Section: Nist Tests For Cryptographic Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…The NIST test suite [10,27] has been used to assess the randomness of several cryptographic algorithms [28][29][30][31]. The competition process for selecting the AES involves a rigorous series of randomness evaluations.…”
Section: Nist Tests For Cryptographic Algorithmsmentioning
confidence: 99%
“…The authors in [29] presented a framework based on the NIST suite to evaluate the randomness outcomes of cryptographic algorithms. The proposed framework used three NIST statistical tests to evaluate the randomness of block ciphers and stream ciphers, including TEA, Camellia, and LEX.…”
Section: Nist Tests For Cryptographic Algorithmsmentioning
confidence: 99%
“…There are some proposals in the literature of ciphers for IoT, such as the block cipher ANU [ 9 ] and its modification, ANU-II [ 10 ]. In their articles, comparisons were presented of the computing requirements of the ANU ciphers against the ones of some well-known ciphers, such as PRESENT, KLEIN, PICCOLO, TWINE, KATAN, SIMON, AES, CLEFIA, LED, RECTANGLE, ZORRO and LiCi; showing that ANU ciphers have fewer requirements.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1. ANU-II cipher [8] Where the symbols >>> and <<< denote circular right shift and circular left shift and the symbol ⊕ refers to an Exclusive OR operation. ANU cipher design has been modified by a group of researchers which results in an efficient version of the ANU cipher design called the ANU-II algorithm.…”
mentioning
confidence: 99%
“…ANU cipher design has been modified by a group of researchers which results in an efficient version of the ANU cipher design called the ANU-II algorithm. An effort has been made to get efficient design metrics for limited resources devices in IoT and RFID tags [8]. The ANU-II cipher consists of the following components: a. S-Box…”
mentioning
confidence: 99%