A review of the nist lightweight cryptography finalists and their fault analyses
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
Blockcipher-based authenticated encryption: how small can we go?
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …
focusing on minimizing the implementation size, ie, hardware gates or working memory on …
Differential cryptanalysis of WARP
WARP is an energy-efficient lightweight block cipher that is currently the smallest 128-bit
block cipher in terms of hardware. It was proposed by Banik et al. in SAC 2020 as a …
block cipher in terms of hardware. It was proposed by Banik et al. in SAC 2020 as a …
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
In differential-like attacks, the process typically involves extending a distinguisher forward
and backward with probability 1 for some rounds and recovering the key involved in the …
and backward with probability 1 for some rounds and recovering the key involved in the …
[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher
T Fan, L Li, Y Wei, E Pasalic - International Journal of …, 2022 - journals.sagepub.com
Lightweight ciphers are often used as the underlying encryption algorithm in resource-
constrained devices. Their cryptographic security is a mandatory goal for ensuring the …
constrained devices. Their cryptographic security is a mandatory goal for ensuring the …
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
Computer aided cryptanalysis has been popular for recent several years, however, most of
these automations are semi-automations which leave cryptographers to complete the …
these automations are semi-automations which leave cryptographers to complete the …
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
S Nobuyuki - IET Information Security, 2023 - Wiley Online Library
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the
lightweight block cipher for Internet of things devices in an edge computing environment …
lightweight block cipher for Internet of things devices in an edge computing environment …
Linear cryptanalyses of three AEADs with GIFT-128 as underlying primitives
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated
Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT …
Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT …