Results 21 to 30 of about 865 (50)
Some of the next articles are maybe not open access.
7-Stage Pipelined Architecture of ASCON for Resource Constraint Devices
IEEE Embedded Systems LettersAscon is an intended lightweight algorithm designed to deliver efficiency and security for resource-constrained Internet of Things (IoT) devices. This letter presents a field-programmable gate array (FPGA) implementation of the pipelined architecture of ...
A. Bhuvaneshwari +4 more
semanticscholar +1 more source
Ascon on FPGA: Post-Quantum Safe Authenticated Encryption with Replay Protection for IoT
ElectronicsAscon is a family of lightweight cryptographic algorithms designed for Authenticated Encryption with Associated Data (AEAD), hashing, and Extendable Output Functions (XOFs) in resource-constrained environments.
Meera Gladis Kurian, Yuhua Chen
semanticscholar +1 more source
State-of-the-Art ASCON ASIC Achieving 4.3 Gbps@0.8V and 3.5Tb/J@0.6V Outperforming AES by 25 Times
IEEE Transactions on Circuits and Systems Part 1: Regular PapersNIST selected ASCON as the standard Lightweight Cryptography (LWC) algorithm in 2023. ASCON’s implementations promise bringing lightweight Authenticated Encryption (AEAD) to resource-constrained devices surpassing Advanced Encryption Standard (AES ...
Islam Elsadek +9 more
semanticscholar +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity
Scientific ReportsSecure vehicular communication is important in sustaining secure and effective transportation infrastructures. Advances in the Vehicular Internet of Things (VIoT) technology enable communication among vehicles as well as roadside facilities, offering ...
B. A J, K. P., K. R., MuthuHarish R
semanticscholar +1 more source
IEEE transactions on consumer electronics
In the current era, the deployment of video surveillance systems $(VSSs)$ is becoming a common practice in society for properly maintaining laws and order in public and private places.
Mahesh Chaurasia +3 more
semanticscholar +1 more source
In the current era, the deployment of video surveillance systems $(VSSs)$ is becoming a common practice in society for properly maintaining laws and order in public and private places.
Mahesh Chaurasia +3 more
semanticscholar +1 more source
Electronics Letters
The design and implementation of lightweight‐oriented ciphers on hardware has turned into an urgent matter with the expansive field of Internet of Things (IoT) and the ever increasing presence of small electronic devices that require fast and secure ...
Miguel Martín-González +3 more
semanticscholar +1 more source
The design and implementation of lightweight‐oriented ciphers on hardware has turned into an urgent matter with the expansive field of Internet of Things (IoT) and the ever increasing presence of small electronic devices that require fast and secure ...
Miguel Martín-González +3 more
semanticscholar +1 more source
Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon
Applied SciencesThe increasing adoption of digital technologies, robotic systems, and IoT applications in sectors such as medicine, agriculture, and industry drives a surge in data generation and necessitates secure and efficient encryption.
Gülyeter Öztürk +4 more
semanticscholar +1 more source
IACR Transactions on Symmetric Cryptology
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
C. Tezcan +2 more
semanticscholar +1 more source
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
C. Tezcan +2 more
semanticscholar +1 more source
Correlation Power Analysis on Ascon with Multi-Bit Selection Function
International Conference on Security and Cryptography: Ascon has recently been selected by NIST as the new standard for lightweight cryptography. This highlights the need to evaluate its resilience against implementation attacks such as Correlation Power Analysis (CPA).
Viet Sang Nguyen +2 more
semanticscholar +1 more source
Optimized and Reconfigurable Hardware Design for ASCON AEAD and Hash Standards
International Symposium on Circuits and SystemsNIST has finalized LWC standardization process by selecting ASCON as the new standard. ASCON is a versatile algorithm supporting two primary functions: AEAD and HASH.
Islam Elsadek, E. Tawfik
semanticscholar +1 more source

