Results 1 to 10 of about 5,501 (211)

Study About the Performance of Ascon in Arduino Devices [PDF]

open access: goldApplied Sciences
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda   +4 more
doaj   +3 more sources

The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems [PDF]

open access: goldSensors
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Meera Gladis Kurian, Yuhua Chen
doaj   +4 more sources

Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon [PDF]

open access: goldJournal of Cybersecurity and Privacy
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management.
Hiba Belfqih, Abderrahim Abdellaoui
doaj   +3 more sources

Post-Quantum enhanced Ascon for secure vehicular IoT data integrity [PDF]

open access: yesScientific Reports
Secure vehicular communication is important in sustaining secure and effective transportation infrastructures. Advances in the Vehicular Internet of Things (VIoT) technology enable communication among vehicles as well as roadside facilities, offering ...
Bhuvaneshwari A. J   +3 more
doaj   +3 more sources

The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges [PDF]

open access: diamondChips
The rapid growth of the Internet of Things (IoT) has significantly expanded the deployment of resource-constrained devices, introducing new security and privacy challenges.
Mattia Mirigaldi   +3 more
doaj   +3 more sources

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: diamondIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +4 more sources

Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]

open access: yesSci Rep
The Internet of Vehicles (IoV) is crucial in facilitating secure and efficient vehicle-infrastructure communication. Nevertheless, with an increasing reliance on the IoV in modern logistics and intelligent fleet systems, cyberattacks on vital supply ...
A J B, Kaythry P.
europepmc   +2 more sources

Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0 [PDF]

open access: goldNetwork
Persistent security challenges in Industry 4.0 due to the limited resources of IoT devices necessitate innovative solutions. Addressing this, this study introduces the ASCON algorithm for lightweight authenticated encryption with associated data ...
Mohammed El-Hajj   +1 more
doaj   +4 more sources

Practical Cube Attack against Nonce-Misused Ascon

open access: diamondIACR Transactions on Symmetric Cryptology, 2022
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin   +2 more
doaj   +3 more sources

Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy