Abstract
We detail updates of the Spook candidate to the NIST lightweight cryptography competition. Among others, we discuss new leakage-resistance proofs under weaker assumptions, new implementation results (both in software and hardware, unprotected and protected against side-channel analysis), and we propose a tweak in order to increase Spook’s security margins without affecting its performances. We also list platforms and metrics for which the candidate should perform better than current standards, together with target use cases for which it is optimized.
Original language | American English |
---|---|
State | Published - 18 Sep 2020 |