Cryptography in Industrial Embedded Systems: our experience of needs and constraints
Jean-Philippe Aumasson, Antony Vennard
FELICS-AE: a framework to benchmark lightweight authenticated block ciphers
Kévin Le Gouguec
Does gate count matter? Hardware efficiency of logic-minimization techniques for cryptographic primitives
Shashank Raghuraman and Leyla Nazhandali
Analyzing the Leakage-Resistance of some Round 1 Candidates of the NIST’s Lightweight Crypto Standardization Process
Francois-Xavier Standaert
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
Tim Beyne, Yu Long Chen, Christoph Dobraunig, and Bart Mennink
Leakage Resilience of the ISAP Mode: A Vulgarized Summary
Christoph Dobraunig and Bart Mennink
Practical Forgery Attacks on Limdolen and HERN
Raghvendra Rohit and Guang Gong
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Behnaz Rezvani and William Diehl
Slide Attack on CLX-128
Alexandre Mège
Security Proof of mixFeed
Bishwajit Chakraborty and Mridul Nandi
Security Proof of ORANGE-Zest
Bishwajit Chakraborty and Mridul Nandi
ESTATE Authenticated Encryption Mode: Hardware Benchmarking and Security Analysis
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
LOTUS and LOCUS AEAD: Hardware Benchmarking and Security Analysis
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas Lopez, Mridul Nandi, Yu Sasaki
Security Analysis of HyENA Authenticated Encryption Mode
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi
Benchmarking Software Implementations of 1st Round Candidates of the NIST LWC Project on Microcontrollers
Sebastian Renner, Enrico Pozzobon, Jurgen Mottok
Security Proofs for Oribatida
Arghya Bhattacharjee, Eik List, Cuauhtemoc Mancillas López and Mridul Nandi
What the Fork: Implementation Aspects of a Forkcipher
Antoon Purnal, Elena Andreeva, Arnab Roy, and Damian Vizar
A Practical Forgery Attack on Lilliput-AE
Orr Dunkelman, Nathan Keller, Eran Lambooij, and Yu Sasaki
On the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, and Mridul Nandi
Security Proof of Beetle and SpoC
Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi
Ascon v1.2 – Analysis of Security and Efficiency
Christoph Dobraunig, Maria Eichlseder, Florian Mendel and Martin Schläffer
Implementation of three LWC Schemes in the WiFi 4-Way Handshake with Software Defined Radio
Yunjie Yi, Guang Gong and Kalikinkar Mandal
Systematic Testing of Lightweight Cryptographic Implementations
Sydney Pugh, M S Raunak, D. Richard Kuhn, and Raghu Kacker
Cryptanalysis of Internal Keyed Permutation of FlexAEAD
Mostafizar Rahman, Dhiman Saha, Goutam Paul
Forgery on Qameleon and SIV-TEM-PHOTON and SIV-Rijndael256
Nilanjan Datta, Ashwin Jha and Mridul Nandi
Breaking REMUS and TGIF in the light of NIST Lightweight Cryptography Standardization Project
Nilanjan Datta, Ashwin Jha, Alexandre Mège and Mridul Nandi
Updates on Romulus, Remus and TGIF
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin
Distinguishers for Reduced Round Ascon, DryGASCON, and Shamash Permutations
Cihangir Tezcan
FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms
Luan Cardoso dos Santos, Johann Grobschadl and Alex Biryukov
Will the Future Lightweight Standard be RISC-V Friendly?
Gorkem Nisanci, Remzi Atay, Meltem Kurt Pehlivanoglu, Elif Bilge Kavun and Tolga Yalcin
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography
Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol and Kris Gaj
Benchmarking and Optimizing AES for Lightweight Cryptography on ASICs
Jenny W. Yu and Mark D. Aagaard
An Open-Source Platform for Evaluating Side-Channel Countermeasures in Hardware Implementations of Lightweight Authenticated Ciphers
Abubakr Abdulgadir, William Diehl and Jens-Peter Kaps
Hardware Design and Analysis of the ACE and WAGE Ciphers
Mark D. Aagaard, Marat Sattarov, and Nusa Zidaric
Accepted paper(s) that were not presented at the November 2019 Workshop | |
---|---|
Starts: November 04, 2019 - 08:30 AM EST
Ends: November 06, 2019 - 05:00 PM EST
<p> </p>
Format: In-person Type: Workshop
Attendance Type: Cleared individuals only
Audience Type: Industry,Government,Academia,Other
NIST Main Campus Green Auditorium (Administration Building) Gaithersburg, Maryland
Security and Privacy: cryptography