Results 11 to 20 of about 865 (50)
Blockchain is a decentralized digital ledger technology that records transactions across multiple machines while maintaining security, immutability, and transparency. Due to its decentralized architecture, which remains unaffected by fraud and tampering,
R. Hani, Hala Bahjat, Abdul Wahab
semanticscholar +1 more source
Angesichts der wachsenden Bedrohung aktueller digitaler Signaturverfahren durch Quantencomputer steigt das Interesse an quantensicheren Lösungen. Einen Ansatz dafür umfassen die sogenannten hashbasierten digitalen Signaturverfahren.
Eder, Eric Johannes
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Compute-in-Memory Ascon Implementation Based on a Novel 11T SRAM Processing Macro
International Symposium on Low-Power and High-Speed ChipsOver the past decade, a new paradigm of computing called Compute-In-Memory (CIM) has emerged wherein traditional memory circuits, such as static random access memories (SRAMs), can be modified to perform computations on data insitu, leading to enhanced ...
Mark Lee, Chris Clark, S. Mukhopadhyay
semanticscholar +1 more source
Hardware-Accelerated Cryptographic Random Engine for Simulation-Oriented Systems
ElectronicsModern computing platforms increasingly rely on random number generators (RNGs) for modeling probabilistic processes in simulation, probabilistic computing, and system validation.
Meera Gladis Kurian, Yuhua Chen
semanticscholar +1 more source
ASIC Implementation of ASCON Lightweight Cryptography for IoT Applications
IEEE Transactions on Circuits and Systems - II - Express BriefsThe number of IoT devices has grown significantly in recent years, and edge computing in IoT is considered a new and growing trend in the technology industry.
Khai-Duy Nguyen +5 more
semanticscholar +1 more source
Secure IoV communications for smart fleet systems empowered with ASCON
Scientific ReportsThe Internet of Vehicles (IoV) is crucial in facilitating secure and efficient vehicle-infrastructure communication. Nevertheless, with an increasing reliance on the IoV in modern logistics and intelligent fleet systems, cyberattacks on vital supply ...
B. A J, P. Kaythry
semanticscholar +1 more source
ACM Computing Surveys
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
Ascon-Based Lightweight Cryptography Standards for Constrained Devices
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained ...
Meltem Sonmez Turan
semanticscholar +1 more source
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
International Journal of Advanced Research in Computer Science: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications.
N. A. Mustafa
semanticscholar +1 more source
SoK: Security of the Ascon Modes
IACR Transactions on Symmetric CryptologyThe Ascon authenticated encryption scheme and hash function of Dobraunig et al. (Journal of Cryptology 2021) were recently selected as winner of the NIST lightweight cryptography competition.
Charlotte Lefevre, Bart Mennink
semanticscholar +1 more source

