Candidates | ISAP | Ascon, Elephant, GIFT-COFB, ISAP, PHOTON-Beetle, Romulus, SPARKLE, TinyJAMBU, Xoodyak | Elephant, TinyJAMBU, Xoodyak, | Ascon | Xoodyak | |
---|---|---|---|---|---|---|
No. | Design Team => Evaluation Lab |
IAIK, Graz University of Technology, Austria | Ruhr-University Bochum, Germany | Cryptographic Engineering Research Group (CERG), George Mason University, USA | IAIK, Graz University of Technology, Austria | Hardware Security and Cryptographic Processor Lab, Tsinghua University, Beijing, China |
1 | IAIK, Graz University of Technology, Austria | Artix-7: t-test (Ascon, Romulus, Xoodyak, GIFT-COFB, Elephant) - report | ||||
2 | Cryptology and Computer Security Laboratory, Shanghai Jiao Tong University, China | Kintex-7: CPA - report | Kintex-7: t-test, chi-squared test, DL-LA (Romulus, ISAP, GIFT-COFB, Ascon) - report | |||
3 | Hardware Security and Cryptographic Processor Lab, Tsinghua University, Beijing, China | Kintex-7: NICV, t-test, chi-squared test (Xoodyak) - report v2 | Spartan-6: NICV, t-test, chi-squared test (TinyJAMBU) - report | Spartan-6: NICV, t-test, chi-squared test - report | ||
4 | Secure-IC, France | Artix-7: ISO/IEC (Xoodyak) - report | ||||
5 | Cryptographic Engineering Research Group (CERG), George Mason University, USA | Artix-7: t-test - TinyJAMBU: report + related files + RUB comments + RUB results; Xoodyak: report v3 + related files v3; Elephant: report v2 + related files v2; Ascon: report + related files; PHOTON-Beetle: report + related files; | ||||
6 | Ruhr-Universitat Bochum, Germany | PROLEAD: simulation-based probing security evaluation - report and related files |