Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

[PDF][PDF] Xoodyak, a lightweight cryptographic scheme

J Daemen, S Hoffert, M Peeters, GV Assche, RV Keer - 2020 - repository.ubn.ru.nl
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing,
encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …

Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher

D Bellizia, F Berti, O Bronchain, G Cassiers… - IACR Transactions on …, 2020 - inria.hal.science
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …

Farfalle: parallel permutation-based cryptography

G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2016 - eprint.iacr.org
In this paper, we introduce Farfalle, a new permutation-based construction for building a
pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary …

Misuse-free key-recovery and distinguishing attacks on 7-round ascon

R Rohit, K Hu, S Sarkar, S Sun - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Being one of the winning algorithms of the CAESAR competition and currently a second
round candidate of the NIST lightweight cryptography standardization project, the …

Understanding the duplex and its security

B Mennink - Cryptology ePrint Archive, 2022 - eprint.iacr.org
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build
permutation based authenticated encryption schemes. The construction was generalized to …

Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

T Simon, L Batina, J Daemen, V Grosso… - … Conference on the …, 2020 - Springer
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …

Leakage resilience of the duplex construction

C Dobraunig, B Mennink - … 2019: 25th International Conference on the …, 2019 - Springer
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to
cryptographic implementations deployed in a malicious environment. One way to counter …

The indifferentiability of the duplex and its practical applications

JP Degabriele, M Fischlin, J Govinden - … on the Theory and Application of …, 2023 - Springer
The Duplex construction, introduced by Bertoni et al.(SAC 2011), is the Swiss Army knife of
permutation-based cryptography. It can be used to realise a variety of cryptographic objects …