Energy Efficient Encryption Algorithm for Low Resources Devices
Abstract
Full text article
References
Atzori, L., Iera, A. & Morabito, G. (2010). The internet of things: a survey. Comput Netwok, 54(15), 2787–2805.
Gubbi, J., Buyya, R., Marusic, S. & Palaniswami, M. (2013). Internet of things (iot): A vision, architectural
elements, and future directions. Future Generation Computer Systems,29(7), 1645–1660.
Want, R., & Dustdar, S. (2015). Activating the internet of things. IEEEComputer Society,48(9), 16–20.
Mariona, J., Hallman, R., Kline, M., Miguel, J., Major, M. & Kerr, L. (2016). Security in the industrial internet of things. International Conference on Internet of Things and Big Data. At Rome, Italy
Suo, H., Wan, J., Zou, C., & Liu., J. (2012). Security in the internet of things: A Review. IEEE International Conference on Computer Science and Electronics Engineering.
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks: Lessons for securing commodity internet of things devices. The11th ACM on Asia Conference on Computer and Communications Security .
National Bureau of Standards, U.S. Department of Commerce. (1977, January). Data Encryption Standard. Federal Information Processing Standard (FIPS).
Stallings, W. (2009). Cryptography and network security: Principals and Practices.
Lai, X. & Massey, J. (1990). A proposal for a new block encryption standard. In Proceedings of the EUROCRYPT 90 Conference, 389-404.
Schneier. (1994, April). The Blowfish encryption algorithm.Dr. Dobb’s Journal of Software Tools,19(4), 38-40.
Daemen & Rijmen, V. (1999, September 3). AES Proposal: Rijndael, AES algorithm submission. International Journal of Computer Applications.
Nechvatal, James., Barker, Elaine., Bassham, Lawrence., Burr, William., Dworkin, Morris., Foti, James., & Roback, Edward. (2001, May– June). Report on the Development of the Advanced Encryption Standard
(AES). International Journal of Computer Applications, 106 (3).
Coppersmith, D. (1994, May). The Data Encryption Standard (DES) and Its Strength Against Attacks. IBM Journal of Research and Development, 243 - 250.
Biham, E., Shamir, A. (1991). Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology,4(l).
Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007, March). New Lightweight DES Variants. Fast
Software Encryption 2007, LNCS, Springer-Verlag, 26.-28.
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., . . . Vikkelsoe, C.
(2007, September 10). PRESENT: An Ultra-Lightweight Block Cipher. International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria: LNCS, Springer-Verlag.
Korte, T., & Silverlight. (2009, February). Implementation of PRESENT. M.sc. thesis, Embedded Security
Group. Ruhr University Bochum.
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2013). The SIMON and
SPECK Families of Lightweight Block Ciphers. IACR Cryptology ePrint Archive.
Rivest, R.L. (1994, December 14–16). The RC5 Encryption Algorithm. Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium: LNCS 1008.
Wheeler, D.J., & Needham, R.M. (1994, December 14–16). TEA, A Tiny Encryption Algorithm. Proc.
Second International Workshop on Fast Software Encryption (FSE 1994), Leuven, Belgium: LNCS 1008,
-366.
Christophe, De Canni‘ere. (2005). GOST article. Encyclopedia of Cryptography and Security, 242-243.
Courtois, Nicolas, T., Miształ, Michał. (2011). Differential cryptanalysis of GOST . Cryptology ePrint
Archive, from http: //eprint.iacr.org/2011/312.
Courtois, Nicolas T. (2012). An improved differential attack on full GOST. Cryptology ePrint Archive, from http://eprint.iacr.org/2012/138.
Seberry, Jennifer., Zhang, Xian-Mo., Zheng, Yuliang. (1993, August 10). Systematic generation of cryptographically robust s-boxes. The First ACM Conference on Computer and Communications Security. New York, USA.
Authors
- The Author shall grant to the Publisher and its agents the nonexclusive perpetual right and license to publish, archive, and make accessible the Work in whole or in part in all forms of media now or hereafter known under a Creative Commons Attribution 4.0 License or its equivalent, which, for the avoidance of doubt, allows others to copy, distribute, and transmit the Work under the following conditions:
- Attribution: other users must attribute the Work in the manner specified by the author as indicated on the journal Web site;
With the understanding that the above condition can be waived with permission from the Author and that where the Work or any of its elements is in the public domain under applicable law, that status is in no way affected by the license.
- The Author is able to enter into separate, additional contractual arrangements for the nonexclusive distribution of the journal's published version of the Work (e.g., post it to an institutional repository or publish it in a book), as long as there is provided in the document an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post online a pre-publication manuscript (but not the Publisher's final formatted PDF version of the Work) in institutional repositories or on their Websites prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see The Effect of Open Access). Any such posting made before acceptance and publication of the Work shall be updated upon publication to include a reference to the Publisher-assigned DOI (Digital Object Identifier) and a link to the online abstract for the final published Work in the Journal.
- Upon Publisher's request, the Author agrees to furnish promptly to Publisher, at the Author's own expense, written evidence of the permissions, licenses, and consents for use of third-party material included within the Work, except as determined by Publisher to be covered by the principles of Fair Use.
- The Author represents and warrants that:
- The Work is the Author's original work;
- The Author has not transferred, and will not transfer, exclusive rights in the Work to any third party;
- The Work is not pending review or under consideration by another publisher;
- The Work has not previously been published;
- The Work contains no misrepresentation or infringement of the Work or property of other authors or third parties; and
- The Work contains no libel, invasion of privacy, or other unlawful matter.
- The Author agrees to indemnify and hold Publisher harmless from Author's breach of the representations and warranties contained in Paragraph 7 above, as well as any claim or proceeding relating to Publisher's use and publication of any content contained in the Work, including third-party content.
This work is licensed under a Creative Commons Attribution 4.0 International License.
