We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying primitive. In particular, for authenticated encryption, we show how to instantiate members of SKINNY in the Deoxys-I-like ΘCB3 framework to fulfill the submission requirements of the NIST lightweight cryptography standardization process. For hashing, we use SKINNY to build a function with larger internal state and employ it in a sponge construction. To highlight the extensive amount of third-party analysis that SKINNY obtained since its publication, we briefly survey the existing cryptanaly...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The need for lightweight cryptosystems is on a rise as they are compatible with energy- and memory- ...
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers inten...
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting ...
peer reviewedIn April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a cont...
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware foo...
Skinny is a lightweight tweakable block cipher which received a great deal of cryptanalytic attentio...
Recently, cryptographic literature has seen new block cipher designs such as PRESENT, GIFT or SKINNY...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Lightweight cryptography is characterized by the need for low implementation cost, while still provi...
International audienceHighly efficient encryption and authentication of short messages is an essenti...
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Nait...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
In this article, we propose two new families of very lightweight and efficient authenticated encrypt...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The need for lightweight cryptosystems is on a rise as they are compatible with energy- and memory- ...
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers inten...
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting ...
peer reviewedIn April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a cont...
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware foo...
Skinny is a lightweight tweakable block cipher which received a great deal of cryptanalytic attentio...
Recently, cryptographic literature has seen new block cipher designs such as PRESENT, GIFT or SKINNY...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Lightweight cryptography is characterized by the need for low implementation cost, while still provi...
International audienceHighly efficient encryption and authentication of short messages is an essenti...
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Nait...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
In this article, we propose two new families of very lightweight and efficient authenticated encrypt...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
The need for lightweight cryptosystems is on a rise as they are compatible with energy- and memory- ...