Aumasson, J., Neves, S., Wilcox-O’Hearn, Z., and Winner-
lein, C. (2013b). Blake2: Simpler, smaller, fast as
md5. In International Conference on Applied Cryp-
tography and Network Security. Springer.
Babbage, S. and Dodd, M. (2008). The mickey stream ci-
phers. In New Stream Cipher Designs. Springer.
Badel, S., Dagtekin, N., Nakahara, J., Ouafi, K., Reff
´
e,
N., Sepehrdad, P., Susil, P., and Vaudenay, S. (2010).
Armadillo: A multi-purpose cryptographic primitive
dedicated to hardware. In Workshop on Cryptographic
Hardware and Embedded Systems. Springer.
Baysal, A. and Sahin, S. (2015). Roadrunner: A small and
fast bitslice block cipher for low cost 8-bit proces-
sors. In Lightweight Cryptography for Security and
Privacy. Springer.
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S.,
Weeks, B., and Wingers, L. (2015). The simon and
speck lightweight block ciphers. In 52nd Design Au-
tomation Conference. IEEE.
Beierle, C., Jean, J., K
¨
olbl, S., Leander, G., Moradi, A.,
Peyrin, T., Sasaki, Y., Sasdrich, P., and Sim, S. M.
(2016). The skinny family of block ciphers and its
low-latency variant mantis. In Annual International
Cryptology Conference. Springer.
Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici,
K., and Verbauwhede, I. (2011). Spongent: A
lightweight hash function. In Workshop on Crypto-
graphic Hardware and Embedded Systems. Springer.
Bogdanov, A., Knudsen, L., Leander, G., Paar, C.,
Poschmann, A., Robshaw, M., Seurin, Y., and Vikkel-
soe, C. (2007). Present: An ultra-lightweight block
cipher. In International workshop on cryptographic
hardware and embedded systems. Springer.
Borghoff, J., Canteaut, A., G
¨
uneysu, T., Kavun, E. B.,
Knezevic, M., Knudsen, L., Leander, G., Nikov, V.,
Paar, C., Rechberger, C., Rombouts, P., Thomsen,
S. S., and Yalc¸in, T. (2012). Prince–a low-latency
block cipher for pervasive computing applications. In
International Conference on the Theory and Applica-
tion of Cryptology and Information Security. Springer.
Canni
`
ere, C. (2006). Trivium: A stream cipher construction
inspired by block cipher design principles. In Interna-
tional Conference on Information Security. Springer.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, F., and Kohno, T. (2011). Comprehensive
experimental analyses of automotive attack surfaces.
In USENIX.
Chen, C., X.Wang, W. H., and Zang, B. (2009). A robust
detection of the sybil attack in urban vanets. In Con-
ference on Distributed Computing Systems. IEEE.
Dacosta, I., Chakradeo, S., Ahamad, M., and Traynor, P.
(2012). Onetime cookies: preventing session hijack-
ing attacks with stateless authentication tokens. In
ACM Transactions on Internet Technology.
David, M., Ranasinghe, D., and Larsen, T. (2011). A2u2:
a stream cipher for printed electronics rfid tags. In
International Conference on RFID. IEEE.
Dinu, D., Perrin, L., Udovenko, A., Velichkov, V.,
Großsch
¨
adl, J., and Biryukov, A. (2016). Design
strategies for arx with provable bounds: Sparx and lax.
In Conference on the Theory and Application of Cryp-
tology and Information Security. Springer.
Dobraunig, C., Eichlseder, M., Mendel, F., and Schl
¨
affer,
M. (2016). Ascon. In CAESAR competition.
Fan, X., Mandal, K., and Gong, G. (2013). Wg-8: A
lightweight stream cipher for resource-constrained
smart devices. In International Conference on Hetero-
geneous Networking for Quality, Reliability, Security
and Robustness. Springer.
Gheraibia, Y., Kabir, S., Djaffi, K., and Krimou, K. (2018).
An overview of the approaches for automotive safety
integrity levels allocation. In Journal of Failure Anal-
ysis and Prevention.
Gong, Z., Nikova, S., and Law, Y. W. (2011). Klein: a new
family of lightweight block ciphers. In International
Workshop on Radio Frequency Identification: Secu-
rity and Privacy Issues. Springer.
Guo, J., Peyrin, T., and Poschmann, A. (2011a). The pho-
ton family of lightweight hash functions. In Annual
Cryptology Conference. Springer.
Guo, J., Peyrin, T., Poschmann, A., and Robshaw, M.
(2011b). The led block cipher. In Workshop on
Cryptographic Hardware and Embedded Systems.
Springer.
Han, G., Zeng, H., Li, Y., and Dou, W. (2014). Safe:
Security-aware flexray scheduling engine. In DATE.
Hell, M., Johansson, T., and Meier, W. (2007). Grain: a
stream cipher for constrained environments. In Inter-
national Journal of Wireless and Mobile Computing.
Herber, C., Richter, A., Wild, T., and Herkersdorf, A.
(2014). A network virtualization approach for per-
formance isolation in controller area network (can).
In Real-Time and Embedded Technology and Applica-
tions Symposium (RTAS). IEEE.
Hoang, V. T., Krovetz, T., , and Rogaway, P. (2017). Aez
v5: Authenticated encryption by enciphering. In CAE-
SAR.
Hong, D., J. Lee, D. K., Kwon, D., Ryu, K., and Lee, D.
(2013). Lea: A 128-bit block cipher for fast encryp-
tion on common processors. In International Work-
shop on Information Security Applications. Springer.
Hoppe, T., Kiltz, S., and Dittmann, J. (2008). Adaptive dy-
namic reaction to automotive it security incidents us-
ing multimedia car environment. In Information As-
surance and Security.
Hosseinzadeh, J. and Hosseinzadeh, M. (2016). A compre-
hensive survey on evaluation of lightweight symmet-
ric ciphers: Hardware and software implementation.
In Advances in Computer Science Journal.
Hu, Y. C., Perrig, A., and Johnson, D. B. (2005). Ariadne:
a secure on-demand routing protocol for ad hoc net-
works. In Wireless Networks.
Jiang, K., Eles, P., and Peng, Z. (2012). Co-design tech-
niques for distributed real-time embedded systems
with communication security constraints. In DATE.
Leander, G., Paar, C., Poschmann, A., and Schramm, K.
(2007). New lightweight des variants. In International
Workshop on Fast Software Encryption. Springer.
IoTBDS 2022 - 7th International Conference on Internet of Things, Big Data and Security
310