NIST will host the Fifth Lightweight Cryptography Workshop (virtual) on May 9-11, 2022, to discuss various aspects of the finalists and to obtain valuable feedback for the standardization of lightweight cryptographic primitives.
Questions: lwc2022@nist.gov
Important dates:
Submission deadline: March 20, 2022
Notification deadline: April 1, 2022
Registration deadline: May 6, 2022 (Registration is closed. The event has reached capacity.)
Workshop: May 9-11, 2022
Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue, Tetsu Iwata, and Kazuhiko Minematsu
Romulus as NIST LWC Finalist
Chun Guo, Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, and Maki Shigeri
Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre and Bart Mennink
Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes
Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, and Kan Yasuda
Review of the White-Box Encodability of NIST Lightweight Finalists
Alex Charlès and Chloé Gravouil
Practical Cube-Attack Against Nonce-Misused Ascon
Jules Baudrin, Anne Canteaut, and Léo Perrin
Low-Latency Crypto: An Emerging Paradigm of Lightweight Cryptography
Santosh Ghosh
Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective "Applications to Ascon, Grain v1, Xoodoo, and ChaCha"
Kai Hu and Thomas Peyrin
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit, Kai Hu, Sumanta Sarkar, and Siwei Sun
Update on the Security Analysis of Ascon
Christoph Dobraunig, Maria Eichlseder, Johannes Erlacher, Florian Mendel, and Martin Schläffer
Differential-Linear Cryptanalysis on Xoodyak
Orr Dunkelman and Ariel Weizman
TVLA, Correlation Power Analysis and Side-Channel Leakage Assessment Metrics
William Unger, Liljana Babinkostova, Mike Borowczak, Robert Erbes, and Aparna Srinath
Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON
Jeffrey Avery, PhD, Bryson Fraelich, William Duran, Andrew Lee, Agustin Sullivan, Zane Mechalke, Maj. Bobby Birrer, Sameul Dick, and Jordon Cochran
Root-cause Analysis of Power-based Side-channel Leakage in Lightweight Cryptography Candidates
Zhenyuan Liu and Patrick Schaumont
Hardware Implementations of Romulus: Exploring Nonce Misuse Resistance and Boolean Masking
Mustafa Khairallah and Shivam Bhasin
Randomness Testing of the NIST Light Weight Cipher Finalist Candidates
Emanuele Bellini and Yun Ju Huang
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, and Siang Meng Sim
Update on the Performance and Mode-level Properties of ISAP
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, and Thomas Unterluggauer
New Ascon Implementations
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Robert Primas, and Martin Schläffer
Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Standardization Process Finalists
Corentin Verhamme, Gaëtan Cassiers, and François-Xavier Standaert
Need for Low-latency Ciphers - A Comparative Study of NIST LWC Finalists
Tolga Yalcin and Samaneh Ghandali
Side-Channel Resistant Implementations of Three Finalists of the NIST Lightweight Cryptography Standardization Process: Elephant, TinyJAMBU, and Xoodyak
Abubakr Abdulgadir, Richard Haeussler, Sammy Lin, Jens-Peter Kaps, and Kris Gaj
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography (5/9/2022 - new title and updated paper)
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, and Thinh Pham
A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting
Donghoon Chang, Jinkeon Kang, and Meltem Sönmez Turan
Starts: May 09, 2022 - 10:00 AM EDT
Ends: May 11, 2022 - 03:00 PM EDT
The workshop is 10am - 3pm EDT (Washington, DC) [ET (UTC-4)]
Format: Virtual Type: Workshop
Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other
Security and Privacy: cryptography