A review of the nist lightweight cryptography finalists and their fault analyses

H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu, M Nandi - Journal of Cryptology, 2020 - Springer
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …

Differential cryptanalysis of WARP

JS Teh, A Biryukov - Journal of Information Security and Applications, 2022 - Elsevier
WARP is an energy-efficient lightweight block cipher that is currently the smallest 128-bit
block cipher in terms of hardware. It was proposed by Banik et al. in SAC 2020 as a …

Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny

L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …

Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond

L Song, Q Yang, Y Chen, L Hu, J Weng - Annual International Conference …, 2024 - Springer
In differential-like attacks, the process typically involves extending a distinguisher forward
and backward with probability 1 for some rounds and recovering the key involved in the …

[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

T Fan, L Li, Y Wei, E Pasalic - International Journal of …, 2022 - journals.sagepub.com
Lightweight ciphers are often used as the underlying encryption algorithm in resource-
constrained devices. Their cryptographic security is a mandatory goal for ensuring the …

Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework

K Zhang, X Lai, L Wang, J Guan, B Hu, S Wang… - Designs, Codes and …, 2023 - Springer
Computer aided cryptanalysis has been popular for recent several years, however, most of
these automations are semi-automations which leave cryptographers to complete the …

Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK

S Nobuyuki - IET Information Security, 2023 - Wiley Online Library
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the
lightweight block cipher for Internet of things devices in an edge computing environment …

Linear cryptanalyses of three AEADs with GIFT-128 as underlying primitives

L Sun, W Wang, M Wang - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated
Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT …