Review Article
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Table 2
Attacks of algorithms with confidentiality or integrity breach and adversaries knowledge.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
a Threats are (a) recover the secret key, (b) recover the message, (c) manipulate packet header, (d) manipulate message. |