The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations. Their technique decreases the bit size of the datapath and naturally leads to a significant loss in latency (as well as the maximum throughput). Their designs complete a single round of the encryption in 168 (resp. 68) clock cycles for 128 (resp. 64) bit blocks. A follow-up work by Banik et al. (FSE 2020) introduced the swap-and-rotate technique that both eliminates this loss in latency and achieves even smaller footprints. In this paper, we extend these results on bit-serial implementations all the way to four authenticated encryption schemes from...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
We study the synthesis of small functions used as building blocks in lightweight cryptographic desig...
Abstract. Security mechanisms to protect our systems and data from malicious adversaries have become...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Area minimization is one of the main efficiency criterion for lightweight encryption primitives. Whi...
Security mechanisms to protect our systems and data from malicious adversaries have become essential...
The implementation of the AES encryption core by Moradi et al. at Eurocrypt 2011 is one of the small...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Recently, cryptographic literature has seen new block cipher designs such as PRESENT, GIFT or SKINNY...
This paper presents a block cipher that is optimized with respect to latency when implemented in har...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
We study the synthesis of small functions used as building blocks in lightweight cryptographic desig...
Abstract. Security mechanisms to protect our systems and data from malicious adversaries have become...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Area minimization is one of the main efficiency criterion for lightweight encryption primitives. Whi...
Security mechanisms to protect our systems and data from malicious adversaries have become essential...
The implementation of the AES encryption core by Moradi et al. at Eurocrypt 2011 is one of the small...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Recently, cryptographic literature has seen new block cipher designs such as PRESENT, GIFT or SKINNY...
This paper presents a block cipher that is optimized with respect to latency when implemented in har...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
In the last few years, the field of lightweight cryptography has seen an influx in the number of blo...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
GIFT-COFB is a lightweight AEAD scheme and a submission to the ongoing NIST lightweight cryptography...
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into ...
We study the synthesis of small functions used as building blocks in lightweight cryptographic desig...
Abstract. Security mechanisms to protect our systems and data from malicious adversaries have become...