NIST hosted the Fourth Lightweight Cryptography Workshop (virtual) on October 19-21, 2020, to discuss various aspects of the second-round candidates and to obtain valuable feedback for the selection of the finalists.
Agenda includes webcast links
On-Demand Webcast
Current and Future Efforts in Benchmarking NIST LWC Ciphers
Sebastian Renner, Enrico Pozzobon, and Jürgen Mottok
Fixslicing - Application to Some NIST LWC Round 2 Candidates
Alexandre Adomnicai and Thomas Peyrin
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography
Patrick Karl and Michael Tempelmeier
LWC Use Cases: External Memory Encryption
Sebastien Riou
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, and Yingjie Zhang
Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates
Adam Blatchley Hansen, Eske Hoy Nielsen, and Morten Eskildsen
Cryptanalysis of the Permutation Based Algorithm SpoC
Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen
Updates on Elephant
Tim Beyne, Yu Long Chen, Christoph Dobraunig, and Bart Mennink
Update on Ascon Implementations
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schläffer
Protected Hardware Implementation of WAGE
Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, and Nusa Zidaric
Updates on the Implementation Security of ISAP
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, and Thomas Unterluggauer
Active and Passive Side-Channel Key Recovery Attacks on Ascon
Keyvan Ramezanpour, Abubakr Abdulgadir, William Diehl, Jens-Peter Kaps, and Paul Ampadu
Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography
Kalikinkar Mandal and Guang Gong
New Results and Insights on ForkAE
Elena Andreeva, Arne Deprez, Jowan Pittevils, Arnab Roy, Amit Singh Bhati, and Damian Vizár
Structural Classification of Authenticated Encryption Schemes
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, and Mridul Nandi
Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, and Mridul Nandi
Security Analysis of KNOT-AEAD and KNOT-Hash
Wentao Zhang, Tianyou Ding, Chunning Zhou, and Fulei Ji
New Results on Romulus
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results
Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, and Kris Gaj
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware (with Application to the Spook AEAD)
Olivier Brochain, Gaëtan Cassiers, François-Xavier Standaert
AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family
Chun Guo, Mustafa Khairallah, and Thomas Peyrin
Performance Evaluation of Cryptographic Permutations for the Internet of Things
Luan Cardoso dos Santos and Johann Großschädl
Parallel Synchronous Code Generation for Second Round Light Weight Candidates
Pantea Kiaei, Archanaa S. Krishnan, and Patrick Schaumont
Selected Presentations | |
---|---|
October 19, 2020 | Type |
11:10 AM
Towards the Selection of the Finalists Kerry McKay - NIST |
Presentation |
11:30 AM
Benchmarking Round 2 Candidates on Microcontrollers Çağdaş Çalık - NIST |
Presentation |
11:50 AM
Classification of AEAD Avik Chakraborti |
Presentation |
1:00 PM
Revisiting the Security of COMET Authenticated Encryption Scheme Mridul Nandi - Indian Statistical Institute |
Presentation |
1:20 PM
New Results and Insighs on ForkAE Damian Vizár - CSEM |
Presentation |
1:40 PM
Security Analysis of KNOT-AEAD and KNOT-Hash Wentao Zhang - Institute of Information Engineering, Chinese Academy of Sciences |
Presentation |
2:00 PM
Updates on Elephant Tim Beyne - KU Leuven |
Presentation |
2:20 PM
New Results on Romulus Thomas Peyrin - Nanyang Technological University |
Presentation |
2:40 PM
AET-LR: Rate-1 Leakage-Resilient AEAD based on the Romulus Family Mustafa Khairallah - Nanyang Technological University |
Presentation |
October 20, 2020 | Type |
11:00 AM
LWC Use Cases - External Memory Encryption Sebastian Riou - Tiempo-Secure |
Presentation |
11:20 AM
Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography Kalikinkar Mandal - University of New Brunswick |
Presentation |
11:40 AM
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis Dhiman Saha - Indian Institute of Technology Bhilai |
Presentation |
12:00 PM
Cryptanalysis of the Permutation Based Algorithm SpoC Liliya Kraleva - KU Leuven |
Presentation |
1:00 PM
Current and Future Efforts in Benchmarking NIST LWC Ciphers Sebastian Renner - OTH Regensburg |
Presentation |
1:20 PM
Fixslicing - Application to Some NIST LWC Round 2 Candidates Alexandre Adomnicai - Nanyang Technological University |
Presentation |
1:40 PM
A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography Patrick Karl - Technical University of Munich |
Presentation |
2:00 PM
FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results Jens-Peter Kaps - George Mason University Kris Gaj - George Mason University |
Presentation |
2:20 PM
Parallel Synchronous Code Generation for Second Round Light Weight Candidates Kiaei Pantea - Worcester Polytechnic Institute |
Presentation |
October 21, 2020 | Type |
11:00 AM
Update on Ascon Implementations Martin Schläffer - Infineon Technologies AG, Germany |
Presentation |
11:20 AM
On Implementation Security and ISAP v2.0 Robert Primas - Graz University of Technology |
Presentation |
11:40 AM
Active and Passive Side-Channel Key Recovery Attacks on Ascon Keyvan Ramezanpour - Virginia Tech |
Presentation |
12:00 PM
An Evaluation of the Multi-Platform Efficiency of Lightweight Cryptographic Permutations Johann Großschädl - University of Luxembourg |
Presentation |
1:00 PM
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware (with Application to the Spook AEAD) Gaëtan Cassiers - UCLouvain |
Presentation |
1:20 PM
Protected Hardware Implementation of WAGE Nusa Zidaric - University of Waterloo |
Presentation |
1:40 PM
Toolchain for Timing Leakage Analysis of NIST Lightweight Crypto Candidates Adam Hansen - Aarhus University |
Presentation |
2:00 PM
Open Discussion - NIST Lightweight Cryptography Standardization Process Meltem Sönmez Turan |
Presentation |
Starts: October 19, 2020 - 11:00 AM EST
Ends: October 21, 2020 - 03:00 PM EST
Format: Virtual Type: Workshop
Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other
Virtual
Security and Privacy: cryptography