2021
DOI: 10.1049/cdt2.12025
|View full text |Cite
|
Sign up to set email alerts
|

Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things

Abstract: The advancements in wireless communication have created exponential growth in the Internet of Things (IoT) systems. Security and privacy of the IoT systems are critical challenges in many data‐sensitive applications. Herein, high‐throughput and flexible hardware implementations of the Camellia block cipher for IoT applications are presented. In the proposed structures, sub‐blocks of the ciphers are implemented based on optimised circuits. The proposed structures for Camellia are designed and shared for impleme… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
11
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…The progress of smart technology made our lives more comfortable, pleasant and automatic, which led to the emergence of the Internet of Things (IoT). This revolutionary technology connects billions of objects that can communicate, sense and share information [1, 2]. These connected objects can be intelligent thanks to the fact that they can share and communicate information about themselves [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The progress of smart technology made our lives more comfortable, pleasant and automatic, which led to the emergence of the Internet of Things (IoT). This revolutionary technology connects billions of objects that can communicate, sense and share information [1, 2]. These connected objects can be intelligent thanks to the fact that they can share and communicate information about themselves [3].…”
Section: Introductionmentioning
confidence: 99%
“…All these connected devices, also called nodes, are intelligent since they are equipped with a microcontroller unit (MCU) [5]. They are utilised in several IoT applications such as mobile phones, automotive, smart home, health and military applications etc [2]. One important practical issue in these fields is to keep the sensor firmware updated [6].…”
Section: Introductionmentioning
confidence: 99%
“…ii. Camellia as an S-Box-based algorithm is vulnerable to dierential, boomerang linear, and rectangle cryptanalysis of Camellia [6]. iii.…”
mentioning
confidence: 99%
“…iii. As an S-Box-based algorithm, Camellia is vulnerable to dierential, boomerang, truncated Dierential cryptanalysis, slide, and rotational attacks [6]. iv.…”
mentioning
confidence: 99%
See 1 more Smart Citation