Results 1 to 10 of about 865 (50)

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +4 more sources

The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]

open access: yesSensors (Basel)
Hash functions are fundamental components in both cryptographic and non-cryptographic systems, supporting secure authentication, data integrity, fingerprinting, and indexing.
Gladis Kurian M, Chen Y.
europepmc   +3 more sources

Lightweight and scalable security for wireless IoT systems: challenges and research directions [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
The rise of Wireless Sensor Networks (WSN) has redefined the modern digital infrastructure by enabling real-time sensing, decision making, and automation across diverse sectors.
Daniel Migwi, Ryszard S. Romaniuk
doaj   +4 more sources

Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519 [PDF]

open access: yesIACR Cryptology ePrint Archive
Hash functions and extendable output functions are some of the most fundamental building blocks in cryptography. They are often used to build commitment schemes where a committer binds themselves to some value that is also hidden from the verifier until ...
Lorenz Schmid   +2 more
core   +2 more sources

Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices

open access: yesIEEE Access
The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across industries, it also introduces critical challenges in ensuring secure ...
Gabriela Cagua   +2 more
semanticscholar   +1 more source

Decentralized Blockchain-Based Authentication and Interplanetary File System-Based Data Management Protocol for Internet of Things Using Ascon

open access: yesJournal of Cybersecurity and Privacy
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management.
Hiba Belfqih, Abderrahim Abdellaoui
semanticscholar   +1 more source

SAT-Based Space Partitioning and Applications to Ascon-Hash256 [PDF]

open access: yes
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
core  

Study About the Performance of Ascon in Arduino Devices

open access: yesApplied Sciences
In 2023, the Ascon cipher suite was selected as the winner of the National Institute of Standards and Technology (NIST) standardization process for lightweight cryptography, and has emerged as the leading candidate for cryptographic algorithms in ...
Ventura Sarasa Laborda   +4 more
semanticscholar   +1 more source

Permutation-Based Hashing with Stronger (Second) Preimage Resistance - Application to Hash-Based Signature Schemes [PDF]

open access: yes
The sponge is a popular construction of hash function design. It operates with a $b$-bit permutation on a $b$-bit state, that is split into a $c$-bit inner part and an $r$-bit outer part.
Bart Mennink   +6 more
core  

The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges

open access: yesChips
The rapid growth of the Internet of Things (IoT) has significantly expanded the deployment of resource-constrained devices, introducing new security and privacy challenges.
Mattia Mirigaldi   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy