Affiliation:
1. Dept. of Information and Communication Engineering, Nagoya University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference11 articles.
1. [1] National Institute of Standards and Technology, “SHA-3 standard: Permutation-based hash and extendable-output functions,” NIST FIPS PUB 202, U.S. Department of Commerce, Aug. 2015. 10.6028/nist.fips.202
2. [2] G. Bertoni, J. Daemen, M. Peeters, and G.V. Assche, “On the indifferentiability of the sponge construction,” Advances in Cryptology-EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April, 2008. Proceedings, ed. N.P. Smart, Lecture Notes in Computer Science, vol.4965, pp.181-197, Springer, 2008. 10.1007/978-3-540-78967-3_11
3. [3] C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, and S.M. Sim, “SKINNY-AEAD and skinny-hash,” IACR Trans. Symmetric Cryptol., vol.2020, no.S1, pp.88-131, 2020. 10.46586/tosc.v2020.is1.88-131
4. [4] NIST, “Round 2 candidates of the lightweight cryptography standardization process,” See https://csrc.nist.gov/projects/lightweight-cryptography/round-2-candidates, 2020/9/18.
5. [5] C. Beierle, J. Jean, S. Kölbl, G. Leander, A. Moradi, T. Peyrin, Y. Sasaki, P. Sasdrich, and S.M. Sim, “The SKINNY family of block ciphers and its low-latency variant MANTIS,” Advances in Cryptology-CRYPTO 2016-36th Annual International Cryptology Conference, Santa Barbara, CA, USA, Aug. 14-18, 2016, Proceedings, Part II, eds. M. Robshaw and J. Katz, Lecture Notes in Computer Science, vol.9815, pp.123-153, Springer, 2016. 10.1007/978-3-662-53008-5_5