Study About the Performance of Ascon in Arduino Devices [PDF]
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda +4 more
doaj +3 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj +4 more sources
Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon [PDF]
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management.
Hiba Belfqih, Abderrahim Abdellaoui
doaj +3 more sources
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity [PDF]
Secure vehicular communication is important in sustaining secure and effective transportation infrastructures. Advances in the Vehicular Internet of Things (VIoT) technology enable communication among vehicles as well as roadside facilities, offering ...
Bhuvaneshwari A. J +3 more
doaj +3 more sources
The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges [PDF]
The rapid growth of the Internet of Things (IoT) has significantly expanded the deployment of resource-constrained devices, introducing new security and privacy challenges.
Mattia Mirigaldi +3 more
doaj +3 more sources
SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +4 more sources
Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
The Internet of Vehicles (IoV) is crucial in facilitating secure and efficient vehicle-infrastructure communication. Nevertheless, with an increasing reliance on the IoV in modern logistics and intelligent fleet systems, cyberattacks on vital supply ...
A J B, Kaythry P.
europepmc +2 more sources
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 [PDF]
Persistent security challenges in Industry 4.0 due to the limited resources of IoT devices necessitate innovative solutions. Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data ...
Mohammed El-Hajj +1 more
doaj +4 more sources
Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin +2 more
doaj +3 more sources
Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +2 more sources

