A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Exploring differential-based distinguishers and forgeries for ASCON
Automated methods have become crucial components when searching for distinguishers
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …
against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the …
Committing security of Ascon: cryptanalysis on primitive and proof on mode
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from
being decrypted with distinct decryption contexts,(K, N, A) comprising a key K, a nonce N …
being decrypted with distinct decryption contexts,(K, N, A) comprising a key K, a nonce N …
[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
Automatic verification of differential characteristics: Application to reduced Gimli
Since Keccak was selected as the SHA-3 standard, more and more permutation-based
primitives have been proposed. Different from block ciphers, there is no round key in the …
primitives have been proposed. Different from block ciphers, there is no round key in the …
New results on Gimli: full-permutation distinguishers and improved collisions
Gimli Gimli is a family of cryptographic primitives (both a hash function and an AEAD
scheme) that has been selected for the second round of the NIST competition for …
scheme) that has been selected for the second round of the NIST competition for …
[PDF][PDF] Weak-diffusion structure: meet-in-the-middle attacks on sponge-based hashing revisited
L Qin, B Zhao, J Hua, X Dong, X Wang - Cryptology ePrint Archive, 2023 - iacr.steepath.eu
Besides the US NIST standard SHA-3 (Keccak), another sponge-based primitive Ascon was
selected as the NIST standard for lightweight applications, recently. Exploring the security …
selected as the NIST standard for lightweight applications, recently. Exploring the security …