[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
Lightweight AEAD and hashing using the sparkle permutation family
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These
are combined with the Beetle mode to construct a family of authenticated ciphers …
are combined with the Beetle mode to construct a family of authenticated ciphers …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
[HTML][HTML] Block-Hash Signature (BHS) for transaction validation in smart contracts for security and privacy using blockchain
S Bhatnagar, M Dayal, D Singh… - Journal of Mobile …, 2023 - journals.riverpublishers.com
Some of the well-known signature techniques like Winternitz and Lamport are not
considered to be very appropriate for the usage of hashing or smart contracts in Blockchains …
considered to be very appropriate for the usage of hashing or smart contracts in Blockchains …
[PDF][PDF] Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family
With the advent of the Internet of Things (IoT), a myriad of devices are being connected to
one another in order to exchange information. This information has to be secured …
one another in order to exchange information. This information has to be secured …
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX)
S-boxes are the only source of non-linearity in many symmetric primitives. While they are
often defined as being functions operating on a small space, some recent designs propose …
often defined as being functions operating on a small space, some recent designs propose …
[PDF][PDF] ACE: An authenticated encryption and hash algorithm
5 Design Rationale 26 5.1 Choice of the Mode: sLiSCP Sponge Mode................ 26 5.2 ACE
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …
WAGE: an authenticated encryption with a twist
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose
underlying permutation is based on a 37-stage Galois NLFSR over F 2 7. At its core, the …
underlying permutation is based on a 37-stage Galois NLFSR over F 2 7. At its core, the …
The welch-gong stream cipher-evolutionary path
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
Improved attacks on sliscp permutation and tight bound of limited birthday distinguishers
A Hosoyamada, M Naya-Plasencia… - Cryptology ePrint …, 2020 - eprint.iacr.org
Limited birthday distinguishers (LBDs) are widely used tools for the cryptanalysis of
cryptographic permutations. In this paper we propose LBDs on several variants of the …
cryptographic permutations. In this paper we propose LBDs on several variants of the …