Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis.
Tasnime OmraniRhouma RhoumaLayth SlimanPublished in: ICDEc (2018)
Keyphrases
- lightweight
- resource constrained
- rfid tags
- wireless sensor networks
- communication infrastructure
- secret key
- embedded systems
- handheld devices
- sensor networks
- resource constraints
- security mechanisms
- block cipher
- cellular automata
- key management
- public key
- mobile devices
- energy consumption
- hash functions
- low cost
- authentication protocol
- smart phones
- sensor nodes
- encryption scheme
- security protocols
- data collection
- real time
- dos attacks