2019
DOI: 10.1109/jiot.2018.2861324
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient and Side-Channel Secure Cryptographic Hardware for IoT-Edge Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
2

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 23 publications
0
20
0
Order By: Relevance
“…e advanced encryption standard (AES) and error-correcting codes (ECC) are mainly used as basic lightweight encryption elements. Various studies have been aimed to optimize lightweight encryption while balancing security and performance management [69][70][71][72][73][74][75][76].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…e advanced encryption standard (AES) and error-correcting codes (ECC) are mainly used as basic lightweight encryption elements. Various studies have been aimed to optimize lightweight encryption while balancing security and performance management [69][70][71][72][73][74][75][76].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…SIMON is a versatile lightweight block cipher based on Feistal networks, tailored for hardware implementation in resource constrained devices. Different datapath architectures for SIMON have been proposed and studied, which focus on area [33,34], latency [34], throughput [31,34], energy efficiency [34], and security [34]. In other works, SIMON is shown to be promising in terms of area and throughput through simulations [23], but not much published literature exists to demonstrate its implementation in commodity hardware like microcontrollers manufactured by popular companies such as TI, Microchip, ST, etc.…”
Section: Related Workmentioning
confidence: 99%
“…The response time of the first possibility depend on the network latency, while the second one depends on the device characteristics. To make this process faster, it is possible to integrate a security cryptographic hardware into the device [39]. Thanks to this hardware, the encryption and sign process is faster and less computationally expensive, allowing typical IoT devices to make use of this cryptographic mechanism without relying on network latency.…”
Section: Challenges Of Btmentioning
confidence: 99%