Sign in to confirm you’re not a bot
This helps protect our community. Learn more
These chapters are auto-generated

Outline

0:00

The XOODYAK object

1:03

Example of XOF computation

2:15

Example of authenticated encryption session

3:12

Mode-level mitigation of side-channel attacks

4:55

Keyed mode

7:11

Sufficient condition in keyed duplex The permutation must be PRP when the inner part is blinded.

8:14

Security strength

9:09

Multi-target attacks

11:07

The Xoodoo permutation Keccak team, ECC 2017

12:20

Trail bounds

15:50

Third-party cryptanalysis of XOODYAK

18:46

Why is XOODYAK lightweight?

20:36

XOODYAK software performance

23:16

Hardware performance (ASIC)

25:43
Xoodyak, a lightweight cryptographic scheme
N/ALikes
1,160Views
2020Nov 5
Paper by Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer presented at FSE 2020 See https://iacr.org/cryptodb/data/paper..... The conference program is at https://fse.iacr.org/2020/program.php

Follow along using the transcript.

IACR

9.87K subscribers