[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher

K Jhawar, J Gandhi, D Shekhawat, A Upadhyay… - Journal of Real-Time …, 2024 - Springer
Ensuring data security and integrity is crucial for achieving the highest level of protection
and performance in modern cyber-physical systems (CPS). Authenticated encryption with …

New SAT-based Model for Quantum Circuit Decision Problem: Searching for Low-Cost Quantum Implementation

J Chen, Q Liu, Y Fan, L Wu, B Li, M Wang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In recent years, quantum technology has been rapidly developed. As security analyses for
symmetric ciphers continue to emerge, many require an evaluation of the resources needed …

Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB

A Inoue, C Guo, K Minematsu - IET Information Security, 2023 - Wiley Online Library
Nonce‐misuse resilience (NMRL) security of Romulus‐N and GIFT‐COFB is analysed, the
two finalists of NIST Lightweight Cryptography project for standardising lightweight …

S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study

M Naseer, S Tariq, N Riaz, N Ahmed… - arXiv preprint arXiv …, 2024 - arxiv.org
In the resource-constrained world of the digital landscape, lightweight cryptography plays a
critical role in safeguarding information and ensuring the security of various systems …

PAE: towards more efficient and BBB-secure AE from a single public permutation

A Bhattacharjee, R Bhaumik, A Dutta, E List - International Conference on …, 2023 - Springer
Four observations can be made regarding recent trends that have emerged in the evolution
of authenticated encryption schemes:(1) regarding simplicity, the adoption of public …

[PDF][PDF] Status update on elephant

T Beyne, YL Chen, C Dobraunig… - Note at NIST Lightweight …, 2020 - csrc.nist.gov
We first briefly summarize the Elephant authenticated encryption scheme. The mode of
Elephant is a nonce-based encrypt-then-MAC construction, where encryption is performed …

High frequency architecture of lightweight authenticated cipher ELEPHANT-160 for resource-constrained IoT applications

N Baurai, Z Mishra, B Patnaik… - 2023 OITS International …, 2023 - ieeexplore.ieee.org
The increasing prevalence of IoT has led to a growing need for cryptographic solutions that
are both secure and efficient, capable of operating effectively within the limited resources …

: Towards More Efficient and BBB-secure AE From a Single Public Permutation

A Bhattacharjee, R Bhaumik, A Dutta… - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Four recent trends have emerged in the evolution of authenticated encryption schemes:(1)
Regarding simplicity, the adoption of public permutations as primitives allows for sparing a …

BALoo: First and Efficient Countermeasure dedicated to Persistent Fault Attacks

PA Tissot, L Bossuet, V Grosso - 2023 IEEE 29th International …, 2023 - ieeexplore.ieee.org
Persistent fault analysis is a novel and efficient cryptanalysis method. The persistent fault
attacks take advantage of a persistent fault injected in a non-volatile memory, then present …