A review of the nist lightweight cryptography finalists and their fault analyses

H Madushan, I Salam, J Alawatugoda - Electronics, 2022 - mdpi.com
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …

[Књига][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET

A Gupta, A Barthwal, H Vardhan, S Kakria… - Multimedia Tools and …, 2023 - Springer
An authentication protocol is one of the fundamental security mechanisms in distributed
systems to ensure the integrity and trust level of the nodes during communication. Since …

Chosen-plaintext attack on energy-efficient hardware implementation of GIFT-COFB

Y Zhong, U Guin - … on Hardware Oriented Security and Trust …, 2022 - ieeexplore.ieee.org
Electronic devices are connected now more than ever with the prevalence of the Internet of
Things. The ever-increasing communication between these lightweight devices presses for …

Analyzing the provable security bounds of gift-cofb and photon-beetle

A Inoue, T Iwata, K Minematsu - International Conference on Applied …, 2022 - Springer
We study the provable security claims of two NIST Lightweight Cryptography (LwC) finalists,
GIFT-COFB and Photon-Beetle, and present several attacks whose complexities contradict …

GIFT-COFB is tightly birthday secure with encryption queries

A Inoue, K Minematsu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
GIFT-COFB is a finalist of NIST Lightweight cryptography project that aims at standardizing
authenticated encryption schemes for constrained devices. It is a block cipher-based …

CCA Security with Short AEAD Tags

M Khairallah - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The size of the authentication tag represents a significant overhead for applications that are
limited by bandwidth or memory. Hence, some authenticated encryption designs have a …

Enhancing Data Logger Telemetry Security for Go-Karts using GIFT-COFB Algorithm

PA Wiradarma, AT Simamora, S Lintang… - 2023 International …, 2023 - ieeexplore.ieee.org
This study focuses on the implementation of the GIFT-COFB lightweight cryptography
algorithm to enhance the security of kart telemetry, specifically for the steering angle and …

[PDF][PDF] GIFT-COFB Final Round Updates

S Banik, A CHARKRABORTI, A Inoue - 2022-09-30)[2023-06-01]. https … - csrc.nist.gov
GIFT-COFB Status Update (Finalist) Page 1 GIFT-COFB Final Round Updates Subhadeep
Banik1, Avik Chakraborti2, Akiko Inoue4, Tetsu Iwata3, Kazuhiko Minematsu4, Mridul Nandi5 …

When Alice meets the``Hardware''Bob---Attacks and Solutions in the Digital World

Y Zhong - 2024 - etd.auburn.edu
Modern cryptography and the digital world (CMOS mainly) have been advancing side-by-
side. Although cryptographic algorithms only need to be proven with theoretical soundness …