Back to Results
First PageMeta Content
Key size / Advanced Encryption Standard / Advantage / Symmetric-key algorithm / Stream cipher / Format-preserving encryption / Cipher / ARIA / ICE / Cryptography / Block ciphers / Key management


The Design Space of Lightweight Cryptography Nicky Mouha1,2 1 Dept. Electrical Engineering-ESAT/COSIC, KU Leuven, Leuven and iMinds, Ghent, Belgium.
Add to Reading List

Document Date: 2015-04-01 14:55:09


Open Document

File Size: 282,53 KB

Share Result on Facebook

City

Inria / Ghent / /

Company

GMAC / AES / CBC / GPU / Intelligent Transport Systems / /

Country

Belgium / France / /

Currency

USD / /

/

IndustryTerm

deterministic algorithms / cryptographic protocols / wireless patient monitoring systems / example using custom-built hardware / lightweight applications / Internet protocols / on software / probabilistic algorithms / cryptographic algorithms / low-end systems / encryption algorithms / low-latency applications / vehicle security systems / wireless sensor networks / block cipher algorithm / exhaustive key search / cloud computing / secure permutation algorithm / particular symmetric-key cryptographic algorithm / exhaustive search / authenticated encryption algorithms / encryption algorithm / lightweight algorithm / particular algorithm / conventional algorithms / seconds using commodity hardware / Wireless devices / conventional cryptographic algorithms / energy / /

Organization

European Central Bank / /

Person

Prince / /

Position

PRINCE / /

ProgrammingLanguage

JavaScript / /

Technology

encryption / lightweight algorithm / authenticated encryption algorithms / Cryptography / RAM / secure permutation algorithm / on-line deterministic encryption / particular algorithm / encryption algorithms / conventional cryptographic algorithms / Wireless devices / encryption algorithm / symmetric-key encryption / One algorithm / particular symmetric-key cryptographic algorithm / block cipher / Internet protocols / GSM / secret key / block cipher algorithm / format-preserving encryption / A5/1 encryption algorithm / /

SocialTag