2021 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2021
DOI: 10.23919/date51398.2021.9473930
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…NIST encourages public evaluation and publication of schemes security, implementation, and performance. According to [39], TinyJAMBU employs minimum resources compared to ASCON, Romulus, GIFT-COFB, and Xoodyak, but supports a low throughput. Xoodyak, in contrast, achieves the highest throughput to facilitate lowlatency application requirement but resources are expensive.…”
Section: Introductionmentioning
confidence: 99%
“…NIST encourages public evaluation and publication of schemes security, implementation, and performance. According to [39], TinyJAMBU employs minimum resources compared to ASCON, Romulus, GIFT-COFB, and Xoodyak, but supports a low throughput. Xoodyak, in contrast, achieves the highest throughput to facilitate lowlatency application requirement but resources are expensive.…”
Section: Introductionmentioning
confidence: 99%
“…Ten candidates are produced in the latter half of the competition. At the end of this section, the proposed SIMON‐GCM is also compared with the new algorithms proposed by these finalists 26 …”
Section: Measurement Results and Analysismentioning
confidence: 99%
“…The authenticated encryption scheme of Subterranean invokes this round function multiple times after absorbing the encryption key, the associated data, the nonce, and the message. Although the limited spatial footprint of the whole algorithm demonstrated by Mohajerani et al [35] (891 LUTs), we chose to apply only a couple of rounds on a predefined state in order to keep a very low area and latency overhead. A trade-off has been made between the number of rounds to use to meet the architectural requirements and the achievable security and we came up to two rounds.…”
Section: Subterranean Round Function As Starting Blockmentioning
confidence: 99%
“…To do this, we build our generator on top of the round function of a lightweight cryptographic primitive, Subterranean 2.0. Subterranean ranked first in hardware benchmarking either on FPGA [35] or ASIC [36] in terms of spatial footprint and speed compared to other lightweight ciphers submitted to NIST LWC competition [37]. Those results motivate the architectural choice we made for the underlying primitive of the generator.…”
mentioning
confidence: 99%