1 |
Jean, J., Nikolic, I., Peyrin, T. "Tweaks and keys for block ciphers: The TWEAKEY framework". In International Conference on the Theory and Application of Cryptology and Information Security, pp. 274-288, Springer, 2014.
|
2 |
Hell, M., Johansson, T., Meier, W., Sonnerup, J., Yoshida, H., Maximov, A., "Grain-128AEAD", https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/grain-128aead-spec-final.pdf", 2021.
|
3 |
Chakraborti, A., Datta, N., Nandi, M., Yasuda, K. "Beetle family of lightweight and secure authenticated encryption ciphers". IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 218-241, 2018.
|
4 |
Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R., Unterluggauer, T., "ISAP", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/isap-spec-final.pdf", 2021.
|
5 |
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L., "The SIMON and SPECK lightweight block ciphers", Proceedings of the 52nd Annual Design Automation Conference, pp. 1-6, 2015.
|
6 |
NIST, "Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standar dization Process", "https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/final-lwc-submission-requirements-august2018.pdf", 2018.
|
7 |
Iwata, T., Khairallah, M., Minematsum, K., Peyrin, T., Guo, C., "Romulus", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/romulus-spec-final.pdf", 2021.
|
8 |
Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G., "LEA: A 128-bit block cipher for fast encryption on common processors", International Workshop on Information Security Applications, pp. 3-27, 2013.
|
9 |
Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Grossschadl, J., Biryukov, A. "Sparx: a family of ARX-based lightweight block ciphers provably secure against linear and differential attacks", In NIST Lightweight Cryptography Workshop 2016. 2016.
|
10 |
Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R., "The design of Xoodoo and Xoofff", IACR Trans. Symmetric Cryptol. no. 4, pp. 1-38, 2018.
|
11 |
Wu, H., Huang, T., "JAMBU lightweight authenticated encryption mode and AES-JAMBU". CAESAR competition proposal. 2014.
|
12 |
Wen, F., Liu, J., Shan, W. "The COFB Mode of Operation and Its Security Analysis", 2006 International Conference on Computational Intelligence and Security, Vol. 2, pp. 1335-1338, IEEE, 2006.
|
13 |
Hongjun Wu, Tao Huang, "TinyJAMBU", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/tinyjambu-spec-final.pdf", 2021.
|
14 |
Saha, D., Sasaki, Y., Shi, D., Sibleyras, F., Sun, S., Zhang, Y. "On the security margin of TinyJAMBU with refined differential and linear cryptanalysis". IACR Transactions on Symmetric Cryptology, pp. 152-174, 2020.
|
15 |
Dobraunigm, C., Eichlseder, M., Mendel, F., Schlaffer M., "ASCON", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf", 2021.
|
16 |
NIST, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions", FIPS 202, 2015.
|
17 |
Banik, S., Pandey, S. K., Peyrin, T., Sasaki, Y., Sim, S. M., Todo, Y., " GIFT: a small present", International Conference on Cryptographic Hardware and Embedded Systems, pp. 321-345, 2017.
|
18 |
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S, Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S. "HIGHT: A New Block Cipher Suitable for Low-Resource Device", CHES 2006. LNCS, vol. 4249, pp. 46-59, 2006.
|
19 |
Leander, G., Poschmann, A. "On the classification of 4 bit s-boxes", In International Workshop on the Arithmetic of Finite Fields, pp. 159-176, 2007.
|
20 |
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Bobshaw, M. J., Seurin. Y., Vikkelsoe, C., "PRESENT: An Ultra-Lightweight Block Cipher", CHES 2007, pp. 450-466, 2007.
|
21 |
Beierle, C., Jean, J., Kolbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S. M., "The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS", CRYPTO 2016, pp. 123-153, 2016.
|
22 |
NIST, "Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process", NISTIR 8268, 2019.
|
23 |
NIST, "Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process", NISTIR 8369, 2021.
|
24 |
Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nand i, M., Peyrin, T., Yasuda, K., "PHOTON-Beetle", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/photon-beetle-spec-final.pdf", 2021.
|
25 |
Guo, J., Peyrin, T., Poschmann, A. "The PHOTON family of lightweight hash functions" In Annual Cryptology Conference, pp. 222-239. Springer, 2011.
|
26 |
Beierle, C., Biryukov, A., Santos, L., C., Grossschadl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q., Moradi, A., Shahmirzadi, A., R., "SPA RKLE", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/sparkle-spec-final.pdf", 2021.
|
27 |
Banik, S., Bogdanov, A., Peyrin, T., Sasaki, Y., Sim, S., M., Tischhauser, E., Todo, Y., "SUNDAE-GIFT", "https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/SUNDAE-GIFT-spec.pdf", 2021.
|
28 |
Banik, S., Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y., Sim, S., M., Todo, Y., "GIFT-COFB", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/gift-cofb-spec-final.pdf", 2021.
|
29 |
Li, L., Wu, W., Zheng, Y., Zhang, L. "The Relationship between the Construction and Solution of the MILP Models and Applications" IACR Cryptol. ePrint Arch., 2019/49, 2019.
|
30 |
Daemen, J., Hoffert, S., Peeters, M., Assche, G., V., Keer, R., V., Mella, S., "Xoodyak", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/xoodyak-spec-final.pdf", 2021.
|
31 |
Hell, M., Johansson, T.,Meier, W. "Grain: a stream cipher for constrained environments", International journal of wireless and mobile computing, 2(1), pp. 86-93. 2007.
DOI
|