U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Lightweight Cryptography Workshop 2022

NIST hosted the fifth Lightweight Cryptography Workshop (virtual) on May 9-11, 2022, to discuss various aspects of the finalists and to obtain valuable feedback for the standardization of lightweight cryptographic primitives.

Lock representing cybersecurity. May 9-11, 2022 Lightweight Cryptography Workshop Call for Papers
Agenda

A recording of the workshop will be available to the general public for on-demand viewing after the event.  The recording will be available on the LWC 2022 event page approximately 2 weeks after the workshop.

 

 

 

 

Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar  

Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Akiko Inoue, Tetsu Iwata, and Kazuhiko Minematsu

Romulus as NIST LWC Finalist
Chun Guo, Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, and Maki Shigeri

Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre and Bart Mennink

Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes
Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, and Kan Yasuda

Review of the White-Box Encodability of NIST Lightweight Finalists
Alex Charlès and Chloé Gravouil

Practical Cube-Attack Against Nonce-Misused Ascon
Jules Baudrin, Anne Canteaut, and Léo Perrin

Low-Latency Crypto: An Emerging Paradigm of Lightweight Cryptography
Santosh Ghosh

Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective "Applications to Ascon, Grain v1, Xoodoo, and ChaCha"
Kai Hu and Thomas Peyrin

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit, Kai Hu, Sumanta Sarkar, and Siwei Sun

Update on the Security Analysis of Ascon
Christoph Dobraunig, Maria Eichlseder, Johannes Erlacher, Florian Mendel, and Martin Schläffer

Differential-Linear Cryptanalysis on Xoodyak
Orr Dunkelman and Ariel Weizman

TVLA, Correlation Power Analysis and Side-Channel Leakage Assessment Metrics
William Unger, Liljana Babinkostova, Mike Borowczak, Robert Erbes, and Aparna Srinath

Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON
Jeffrey Avery, PhD, Bryson Fraelich, William Duran, Andrew Lee, Agustin Sullivan, Zane Mechalke, Maj. Bobby Birrer, Sameul Dick, and Jordon Cochran

Root-cause Analysis of Power-based Side-channel Leakage in Lightweight Cryptography Candidates
Zhenyuan Liu and Patrick Schaumont

Hardware Implementations of Romulus: Exploring Nonce Misuse Resistance and Boolean Masking
Mustafa Khairallah and Shivam Bhasin 

Randomness Testing of the NIST Light Weight Cipher Finalist Candidates
Emanuele Bellini and Yun Ju Huang

Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, and Siang Meng Sim

Update on the Performance and Mode-level Properties of ISAP
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, and Thomas Unterluggauer

New Ascon Implementations
Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Robert Primas, and Martin Schläffer

Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Standardization Process Finalists
Corentin Verhamme, Gaëtan Cassiers, and François-Xavier Standaert

Need for Low-latency Ciphers - A Comparative Study of NIST LWC Finalists
Tolga Yalcin and Samaneh Ghandali

Side-Channel Resistant Implementations of Three Finalists of the NIST Lightweight Cryptography Standardization Process: Elephant, TinyJAMBU, and Xoodyak
Abubakr Abdulgadir, Richard Haeussler, Sammy Lin, Jens-Peter Kaps, and Kris Gaj

RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography (5/9/2022 - new title and updated paper)
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, and Thinh Pham

General Framework for Evaluating LWC Finalists in Terms of Resistance to Side-Channel Attacks
Jens-Peter Kaps, Kris Gaj, Abubakr Abdulgadir, and Kamyar Mohajerani


A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting
Donghoon Chang, Jinkeon Kang, and Meltem Sönmez Turan

Selected Presentations
May 9, 2022 Type
10:10 AM Update on the NIST Lightweight Cryptography Standardization Process
Meltem Sönmez Turan - NIST
Presentation
10:35 AM Low-Latency Crypto: An Emerging Paradigm of Lightweight Cryptography
Santosh Ghosh - Intel Labs
Presentation
11:00 AM Need for Low-latency Ciphers - A Comparative Study of NIST LWC Finalists
Tolga Yalcin - Google
Presentation
11:25 AM A Real-World Analysis of Lightweight Cryptographic Algorithm ASCON
Jeffrey Avery - Northrop Grumman Corporation
Presentation
1:00 PM 3rd Round Ciphers Evaluation on Microcontrollers
Sebastian Renner - OTH Regensburg
Presentation
1:25 PM RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Johann Großschädl - University of Luxembourg
Presentation
1:50 PM General Framework for Evaluating LWC Finalists in Terms of Resistance to Side-Channel Attacks
Jens-Peter Kaps - George Mason University
Presentation
2:10 PM Analyzing the Leakage Resistance of the NIST's Lightweight Crypto Standardization Process Finalists
François-Xavier Standaert - UCLouvain
Presentation
2:35 PM Review of the White-Box Encodability of NIST Lightweight Finalists
Alex Charlès - University of Rennes
Presentation
May 10, 2022 Type
10:00 AM Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes
Ferdinand Sibleyras - NTT Social Informatics Laboratories
Presentation
10:20 AM Revisiting Higher-Order Differential(-Linear) Attacks from an Algebraic Perspective --Applications to Ascon, Grain v1, Xoodoo, and ChaCha
Kai Hu - Nanyang Technological University
Presentation
10:40 AM Differential-Linear Cryptanalysis on Xoodyak
Ariel Weizman - Bar-Ilan University
Presentation
11:00 AM Practical cube-attack against nonce-misused Ascon
Jules Baudrin - Inria
Presentation
11:20 AM Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Raghvendra Rohit - Technology Innovation Institute
Presentation
11:40 AM A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting
Donghoon Chang - Strativia-NIST
Presentation
1:00 PM Fast Side-Channel Key-Recovery Attack against Elephant Dumbo
Louis Vialar - EPFL, Kudelski Security Research Team
Presentation
1:25 PM Root-cause Analysis of Power-based Side-channel Leakage in Lightweight Cryptography Candidates
Zhenyuan Liu - Worcester Polytechnic Institute
Presentation
1:50 PM Side-Channel Resistant Implementations of Three Finalists of the NIST Lightweight Cryptography Standardization Process: Elephant, TinyJAMBU, and Xoodyak
Abubakr Abdulgadir - George Mason University
Presentation
2:10 PM Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes
Wei Cheng Derrick Ng - DSO National Laboratories
Presentation
2:35 PM TVLA, Correlation Power Analysis and Side-Channel Leakage Assessment Metrics
Liljana Babinkostova - Boise State University
Presentation
May 11, 2022 Type
10:00 AM Romulus as NIST LWC Finalist
Thomas Peyrin - Nanyang Technological University
Presentation
10:25 AM Update on the Security Analysis of Ascon
Maria Eichlseder - Graz University of Technology
Presentation
10:50 AM Update on the Performance and Mode-level Properties of ISAP
Bart Mennink - Radboud University
Robert Primas - Graz University of Technology
Presentation
11:10 AM Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle
Tetsu Iwata - Nagoya University
Presentation
11:35 AM Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre - Radboud University
Presentation
1:00 PM Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai - CryptoNext Security
Presentation
1:25 PM Hardware Implementations of Romulus: Exploring Nonce Misuse Resistance and Boolean Masking
Mustafa Khairallah - Nanyang Technological University
Presentation
1:50 PM New Ascon Implementations
Martin Schläffer - Infineon Technologies AG, Germany
Robert Primas - Graz University of Technology
Presentation
2:10 PM Randomness Testing of the NIST Light Weight Cipher Finalist Candidates
Yunju Huang - Technology Innovation Institute
Presentation
2:35 PM Open Discussion - LWC Workshop 2022
Kerry McKay - NIST
Meltem Sönmez Turan - NIST
Presentation

Event Details

Starts: May 09, 2022 - 10:00 AM EDT
Ends: May 11, 2022 - 03:00 PM EDT
The workshop is 10am - 3pm EDT (Washington, DC) [ET (UTC-4)]

Format: Virtual Type: Workshop

Agenda

Attendance Type: Open to public
Audience Type: Industry,Government,Academia,Other

Parent Project

See: Lightweight Cryptography

Related Topics

Security and Privacy: cryptography

Created November 01, 2021, Updated May 19, 2022