Assignments, Commitments, and Reports of the LWC Side-Channel Security Evaluation Labs Targeting Hardware Implementations

 

Candidates ISAP Ascon, Elephant, GIFT-COFB, ISAP, PHOTON-Beetle, Romulus, SPARKLE, TinyJAMBU, Xoodyak Elephant, TinyJAMBU, Xoodyak, Ascon Xoodyak
No. Design Team =>

Evaluation Lab                             
IAIK, Graz University of Technology, Austria Ruhr-University Bochum, Germany Cryptographic Engineering Research Group (CERG), George Mason University, USA IAIK, Graz University of Technology, Austria Hardware Security and Cryptographic Processor Lab, Tsinghua University, Beijing, China
1 IAIK, Graz University of Technology, Austria Artix-7: t-test (Ascon, Romulus, Xoodyak, GIFT-COFB, Elephant) - report
2 Cryptology and Computer Security Laboratory, Shanghai Jiao Tong University, China Kintex-7: CPA - report Kintex-7: t-test, chi-squared test, DL-LA (Romulus, ISAP, GIFT-COFB, Ascon) - report
3 Hardware Security and Cryptographic Processor Lab, Tsinghua University, Beijing, China Kintex-7: NICV, t-test, chi-squared test (Xoodyak) - report v2 Spartan-6: NICV, t-test, chi-squared test (TinyJAMBU) - report Spartan-6: NICV, t-test, chi-squared test - report
4 Secure-IC, France Artix-7: ISO/IEC (Xoodyak) - report
5 Cryptographic Engineering Research Group (CERG), George Mason University, USA Artix-7: t-test - TinyJAMBU: report + related files + RUB comments + RUB results; Xoodyak: report v3 + related files v3; Elephant: report v2 + related files v2; Ascon: report + related files; PHOTON-Beetle: report + related files;
6 Ruhr-Universitat Bochum, Germany PROLEAD: simulation-based probing security evaluation - report and related files