The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj +3 more sources
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity [PDF]
Secure vehicular communication is important in sustaining secure and effective transportation infrastructures. Advances in the Vehicular Internet of Things (VIoT) technology enable communication among vehicles as well as roadside facilities, offering ...
Bhuvaneshwari A. J +3 more
doaj +3 more sources
SoK: Security of the Ascon Modes
The Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition. The mode underlying Ascon authenticated encryption (Ascon-AE)
Charlotte Lefevre, Bart Mennink
doaj +4 more sources
Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
The Internet of Vehicles (IoV) is crucial in facilitating secure and efficient vehicle-infrastructure communication. Nevertheless, with an increasing reliance on the IoV in modern logistics and intelligent fleet systems, cyberattacks on vital supply ...
A J B, Kaythry P.
europepmc +2 more sources
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua +2 more
doaj +2 more sources
Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +2 more sources
Study About the Performance of Ascon in Arduino Devices
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda +4 more
doaj +2 more sources
Preimage and collision attacks on reduced Ascon using algebraic strategies
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of $$2^{33}$
Qinggan Fu +3 more
doaj +2 more sources
The rapid growth of the Internet of Things (IoT) has significantly expanded the deployment of resource-constrained devices, introducing new security and privacy challenges.
Mattia Mirigaldi +3 more
doaj +2 more sources
Enhanced chromium removal from tannery wastewater through electrocoagulation with iron electrodes: Leveraging the Box-Behnken design for optimization [PDF]
This study is focused on reducing total chromium level in tannery wastewater through the electrocoagulation process, in order to comply with the maximum permissible limits (MPL) and to determine the effects from its main operating factors.
Edwar Aguilar-Ascón +2 more
doaj +2 more sources

