Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things
暂无分享,去创建一个
Rini Wisnu Wardhani | S. Suryadi | K. Ramli | B. Pranggono | A. A. Lestari | Susila Windarta | W. wildan
[1] Laura J. Bowman. Statista , 2022, Journal of Business & Finance Librarianship.
[2] J. Eriksson,et al. The Contiki-NG open source operating system for next generation IoT devices , 2022, SoftwareX.
[3] Eric Pardede,et al. A Secure Mutual authentication approach to fog computing environment , 2021, Comput. Secur..
[4] Joan Daemen,et al. Xoodyak, a lightweight cryptographic scheme , 2020, IACR Trans. Symmetric Cryptol..
[5] Anne Canteaut,et al. Saturnin: a suite of lightweight symmetric algorithms for post-quantum security , 2020, IACR Trans. Symmetric Cryptol..
[6] Alex Biryukov,et al. Lightweight AEAD and Hashing using the Sparkle Permutation Family , 2020, IACR Trans. Symmetric Cryptol..
[7] Joan Daemen,et al. The Subterranean 2.0 Cipher Suite , 2020, IACR Trans. Symmetric Cryptol..
[8] Taekyoung Kwon,et al. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things , 2020, IEEE Access.
[9] Kun-Lin Tsai,et al. Secure Session Key Generation Method for LoRaWAN Servers , 2020, IEEE Access.
[10] Ali Dehghantanha,et al. A survey on internet of things security: Requirements, challenges, and solutions , 2019, Internet Things.
[11] Samiran Chattopadhyay,et al. Physically Secure Lightweight Anonymous User Authentication Protocol for Internet of Things Using Physically Unclonable Functions , 2019, IEEE Access.
[12] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[13] Chunhua Su,et al. A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things , 2019, ACM Trans. Embed. Comput. Syst..
[14] Jing Li,et al. Cryptographic primitives in blockchains , 2019, J. Netw. Comput. Appl..
[15] Joan Daemen,et al. The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..
[16] Kan Yasuda,et al. Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[17] Alex Biryukov,et al. State of the Art in Lightweight Symmetric Cryptography , 2017, IACR Cryptol. ePrint Arch..
[18] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[19] Ling Cheng,et al. A New Cryptographic Analysis of 4-bit S-Boxes , 2015, Inscrypt.
[20] Morris Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[21] Vincent Rijmen,et al. A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT , 2015, FSE.
[22] Fatih Sulak,et al. A New Statistical Randomness Test: Saturation Point Test , 2013 .
[23] Andrey Bogdanov,et al. SPONGENT: The Design Space of Lightweight Cryptographic Hashing , 2011, IEEE Transactions on Computers.
[24] Andrey Bogdanov,et al. spongent: A Lightweight Hash Function , 2011, CHES.
[25] Thomas Peyrin,et al. The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..
[26] Guido Bertoni,et al. Duplexing the sponge: single-pass authenticated encryption and other applications , 2011, IACR Cryptol. ePrint Arch..
[27] Markku-Juhani O. Saarinen. Cryptographic Analysis of All 4 x 4 - Bit S-Boxes , 2011, IACR Cryptol. ePrint Arch..
[28] Shoichi Hirose,et al. A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW , 2010, ICISC.
[29] Guido Bertoni,et al. Sponge-Based Pseudo-Random Number Generators , 2010, CHES.
[30] Andrey Bogdanov,et al. Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.
[31] Gregor Leander,et al. On the Classification of 4 Bit S-Boxes , 2007, WAIFI.
[32] Douglas R. Stinson,et al. Some Observations on the Theory of Cryptographic Hash Functions , 2006, Des. Codes Cryptogr..
[33] Eric Filiol,et al. A New Statistical Testing for Symmetric Ciphers and Hash Functions , 2002, ICICS.
[34] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[35] Ross J. Anderson,et al. Serpent: A New Block Cipher Proposal , 1998, FSE.
[36] M. Suryanegara,et al. A Novel Secure Root Key Updating Scheme for LoRaWANs Based on CTR_AES DRBG 128 , 2022, IEEE Access.
[37] S. Suryadi,et al. Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions , 2022, IEEE Access.
[38] M. Suryanegara,et al. A Novel Session Key Update Scheme for LoRaWAN , 2022, IEEE Access.
[39] Xiaoyang Dong,et al. Triangulating Rebound Attack on AES-like Hashing , 2022, IACR Cryptol. ePrint Arch..
[40] Avik Chakraborti,et al. PHOTON -Beetle Authenticated Encryption and Hash Family , 2021 .
[41] Lei Hu,et al. Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials , 2021, IACR Cryptol. ePrint Arch..
[42] Jian Guo,et al. Quantum Multi-Collision Distinguishers , 2021, IACR Cryptol. ePrint Arch..
[43] Goutam Saha,et al. LightBC: A Lightweight Hash-Based Blockchain for the Secured Internet of Things , 2020 .
[44] Hongjun Wu,et al. TinyJAMBU : A Family of Lightweight Authenticated Encryption Algorithms ( Version 2 ) , 2019 .
[45] Martin Hell. Grain-128AEADv2-A lightweight AEAD stream cipher Cover sheet , 2019 .
[46] Joan Daemen,et al. Xoodoo cookbook , 2018, IACR Cryptol. ePrint Arch..
[47] Marek Sýs,et al. Algorithm 970 , 2016, ACM Trans. Math. Softw..
[48] G. V. Assche,et al. Permutation-based encryption , authentication and authenticated encryption , 2012 .
[49] Onur Koçak,et al. Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..
[50] G. V. Assche,et al. Sponge Functions , 2007 .