Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

Xoodyak, a lightweight cryptographic scheme

J Daemen, S Hoffert, M Peeters… - IACR Transactions on …, 2020 - icscm.ub.rub.de
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing,
encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …

Mode-level vs. implementation-level physical security in symmetric cryptography: A practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain… - IACR …, 2020 - philosophymindscience.org
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

Farfalle: parallel permutation-based cryptography

G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2016 - eprint.iacr.org
In this paper, we introduce Farfalle, a new permutation-based construction for building a
pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary …

Misuse-free key-recovery and distinguishing attacks on 7-round Ascon

R Rohit, K Hu, S Sarkar, S Sun - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being one of the winning algorithms of the CAESAR competition and currently a second
round candidate of the NIST lightweight cryptography standardization project, the …

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

T Simon, L Batina, J Daemen, V Grosso… - … Conference on the …, 2020 - Springer
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …

Leakage resilience of the duplex construction

C Dobraunig, B Mennink - … 2019: 25th International Conference on the …, 2019 - Springer
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to
cryptographic implementations deployed in a malicious environment. One way to counter …

[PDF][PDF] Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus

T Beyne, YL Chen, C Dobraunig… - IACR Transactions on …, 2020 - lirias.kuleuven.be
With the trend to connect more and more devices to the Internet, authenticated encryption
has become a major backbone in securing the communication, not only between these …

SAEB: A lightweight blockcipher-based AEAD mode of operation

Y Naito, M Matsui, T Sugawara, D Suzuki - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Lightweight cryptography in computationally constrained devices is actively studied. In
contrast to advances of lightweight blockcipher in the last decade, lightweight mode of …