[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Lightweight AEAD and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos… - IACR Transactions …, 2020 - research.ed.ac.uk
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

[HTML][HTML] Block-Hash Signature (BHS) for transaction validation in smart contracts for security and privacy using blockchain

S Bhatnagar, M Dayal, D Singh… - Journal of Mobile …, 2023 - journals.riverpublishers.com
Some of the well-known signature techniques like Winternitz and Lamport are not
considered to be very appropriate for the usage of hashing or smart contracts in Blockchains …

[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family

C Beierle, A Biryukov, LC dos Santos, J Großschädl… - NIST round, 2019 - csrc.nist.gov
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …

Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX)

C Beierle, A Biryukov, L Cardoso dos Santos… - Advances in Cryptology …, 2020 - Springer
S-boxes are the only source of non-linearity in many symmetric primitives. While they are
often defined as being functions operating on a small space, some recent designs propose …

[PDF][PDF] ACE: An authenticated encryption and hash algorithm

M Aagaard, R AlTawy, G Gong, K Mandal… - Submission to NIST-LWC …, 2019 - lab.las3.de
5 Design Rationale 26 5.1 Choice of the Mode: sLiSCP Sponge Mode................ 26 5.2 ACE
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …

WAGE: an authenticated encryption with a twist

R AlTawy, G Gong, K Mandal, R Rohit - IACR Transactions on …, 2020 - tosc.iacr.org
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose
underlying permutation is based on a 37-stage Galois NLFSR over F 2 7. At its core, the …

The welch-gong stream cipher-evolutionary path

N Zidarič, K Mandal, G Gong, M Aagaard - Cryptography and …, 2024 - Springer
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …

Improved attacks on sliscp permutation and tight bound of limited birthday distinguishers

A Hosoyamada, M Naya-Plasencia… - Cryptology ePrint …, 2020 - eprint.iacr.org
Limited birthday distinguishers (LBDs) are widely used tools for the cryptanalysis of
cryptographic permutations. In this paper we propose LBDs on several variants of the …