Chapters
Introduction
Introduction
0:00
Introduction
0:00
Romulus and Remus
Romulus and Remus
1:04
Romulus and Remus
1:04
Basics of Romulus
Basics of Romulus
1:57
Basics of Romulus
1:57
Family Members of Romulus
Family Members of Romulus
3:03
Security Bounds for Romulus-N
Security Bounds for Romulus-N
10:05
Power of Full n-bit Standard-model Security
Power of Full n-bit Standard-model Security
11:18
Security Bounds for Romulus-M Nonce-Respecting (NR) adversary
Security Bounds for Romulus-M Nonce-Respecting (NR) adversary
13:28
RUP Security of Romulus-M (Update at NIST LWC 2020)
RUP Security of Romulus-M (Update at NIST LWC 2020)
14:42
Comparison with other TBC-based schemes (n = k = 128)
Comparison with other TBC-based schemes (n = k = 128)
16:02
ASIC Performance Ranking
ASIC Performance Ranking
16:31
ASIC Performance Ranking
16:31
Some Hw Implementation Details
Some Hw Implementation Details
17:43
Remus IC-based Encryption (ICE) • IC to TBC conversion, a variant of XHX [JLM+17]
Remus IC-based Encryption (ICE) • IC to TBC conversion, a variant of XHX [JLM+17]
20:11
Security Bounds of Remus
Security Bounds of Remus
21:20
Security Bounds of Remus
21:20
Concluding Remarks
Concluding Remarks
21:53
Concluding Remarks
21:53
Sync to video time
Description
N/ALikes
281Views
2020Nov 5
Chapters
View all
View all
Transcript
Follow along using the transcript.
Show transcript
IACR
9.87K subscribers
Transcript
NaN / NaN