The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics| NIST
NIST began investigating cryptography for constrained environments in 2013. After two workshops and discussions with stakeholders in industry, government, and academia, NIST initiated a process to solicit, evaluate, and standardize schemes providing...| csrc.nist.gov
CAESAR submissions| competitions.cr.yp.to