A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arxiv preprint arxiv …, 2023 - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

Exploring differential-based distinguishers and forgeries for ASCON

D Gérault, T Peyrin, QQ Tan - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
Automated methods have become crucial components when searching for distinguishers
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …

Committing security of Ascon: cryptanalysis on primitive and proof on mode

Y Naito, Y Sasaki, T Sugawara - IACR Transactions on Symmetric …, 2023 - tches.iacr.org
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from
being decrypted with distinct decryption contexts,(K, N, A) comprising a key K, a nonce N …

[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Automatic verification of differential characteristics: Application to reduced Gimli

F Liu, T Isobe, W Meier - Advances in Cryptology–CRYPTO 2020: 40th …, 2020 - Springer
Since Keccak was selected as the SHA-3 standard, more and more permutation-based
primitives have been proposed. Different from block ciphers, there is no round key in the …

New results on Gimli: full-permutation distinguishers and improved collisions

A Flórez Gutiérrez, G Leurent… - … Conference on the …, 2020 - Springer
Gimli Gimli is a family of cryptographic primitives (both a hash function and an AEAD
scheme) that has been selected for the second round of the NIST competition for …

[PDF][PDF] Weak-diffusion structure: meet-in-the-middle attacks on sponge-based hashing revisited

L Qin, B Zhao, J Hua, X Dong, X Wang - Cryptology ePrint Archive, 2023 - iacr.steepath.eu
Besides the US NIST standard SHA-3 (Keccak), another sponge-based primitive Ascon was
selected as the NIST standard for lightweight applications, recently. Exploring the security …