Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021‏ - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

State-of-the-art analysis of quantum cryptography: applications and future prospects

SK Sahu, K Mazumdar - Frontiers in Physics, 2024‏ - frontiersin.org
Quantum computing provides a revolution in computational competences, leveraging the
principles of quantum mechanics to process data in fundamentally novel ways. This paper …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021‏ - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021‏ - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain… - IACR …, 2020‏ - philosophymindscience.org
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

Randomness generation for secure hardware masking-unrolled trivium to the rescue

G Cassiers, L Masure, C Momin, T Moos… - Cryptology ePrint …, 2023‏ - eprint.iacr.org
Masking is a prominent strategy to protect cryptographic implementations against side-
channel analysis. Its popularity arises from the exponential security gains that can be …

[كتاب][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023‏ - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Systematic study of decryption and re-encryption leakage: The case of kyber

M Azouaoui, O Bronchain, C Hoffmann… - … on Constructive Side …, 2022‏ - Springer
The side-channel cryptanalysis of Post-Quantum (PQ) key encapsulation schemes has been
a topic of intense activity over the last years. Many attacks have been put forward: Simple …

Low trace-count template attacks on 32-bit implementations of ASCON AEAD

SC You, MG Kuhn, S Sarkar, F Hao - IACR Transactions on …, 2023‏ - tches.iacr.org
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption
algorithm for use in resource-constrained cryptographic devices. To help assess side …

Post-quantum authenticated encryption against chosen-ciphertext side-channel attacks

M Azouaoui, Y Kuzovkova… - IACR …, 2022‏ - ojs.ub.ruhr-uni-bochum.de
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC)
candidates in the NIST standardization initiative has received increased attention. In …