Results 1 to 10 of about 865 (50)
SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +4 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Gladis Kurian M, Chen Y.
europepmc +3 more sources
Lightweight and scalable security for wireless IoT systems: challenges and research directions [PDF]
The rise of Wireless Sensor Networks (WSN) has redefined the modern digital infrastructure by enabling real-time sensing, decision making, and automation across diverse sectors.
Daniel Migwi, Ryszard S. Romaniuk
doaj +4 more sources
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 [PDF]
Hash functions and extendable output functions are some of the most fundamental building blocks in cryptography. They are often used to build commitment schemes where a committer binds themselves to some value that is also hidden from the verifier until ...
Lorenz Schmid +2 more
core +2 more sources
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua +2 more
semanticscholar +1 more source
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management.
Hiba Belfqih, Abderrahim Abdellaoui
semanticscholar +1 more source
SAT-Based Space Partitioning and Applications to Ascon-Hash256 [PDF]
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
core
Study About the Performance of Ascon in Arduino Devices
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda +4 more
semanticscholar +1 more source
Permutation-Based Hashing with Stronger (Second) Preimage Resistance - Application to Hash-Based Signature Schemes [PDF]
The sponge is a popular construction of hash function design. It operates with a $b$-bit permutation on a $b$-bit state, that is split into a $c$-bit inner part and an $r$-bit outer part.
Bart Mennink +6 more
core
The rapid growth of the Internet of Things (IoT) has significantly expanded the deployment of resource-constrained devices, introducing new security and privacy challenges.
Mattia Mirigaldi +3 more
semanticscholar +1 more source

