Results 41 to 50 of about 865 (50)
Some of the next articles are maybe not open access.
Nonlinear degree of Ascon permutation
International Journal of Electronics and TelecommunicationsAn estimation of the nonlinear degrees for the forward and inverse permutations of the Ascon algorithm is made in this work. This estimation is made by analyzing higher order differentials. The obtained results of nonlinear degree are significantly lower
Victor Ruzhentsev
semanticscholar +1 more source
A Severe Vulnerability and an Effective Defense Against DFA on Ascon
ACM Transactions on Embedded Computing SystemsDifferential Fault Attack (DFA) is a powerful cryptanalytic technique for recovering cryptographic keys by exploiting computational faults. At Indocrypt 2024, the first DFA on Ascon was introduced using a bit-flip fault model to recover a 64-bit key ...
Smita Das +2 more
semanticscholar +1 more source
Kyber-KEM-Ascon: Benchmarking a Lightweight Post-quantum KEM on IoT Devices
International Symposium on Circuits and SystemsCRYSTALS-Kyber, officially standardized by the U.S. National Institute of Standards and Technology (NIST) in August 2024 as ML-KEM FIPS, is the only post quantum secure key encapsulation mechanism (KEM) standard.
Sahar Shehzadi +6 more
semanticscholar +1 more source
An Optimized Hardware Implementation of ASCON With Power Analysis Attack Resistance
International journal of circuit theory and applicationsIn recent times, the security of data collected and transmitted by IoT nodes has gained high importance. Hence, a lightweight cryptographic algorithm is required to be implemented in such nodes.
P. Ramadass, Saravanan Paramasivam
semanticscholar +1 more source
A Tampering Attack on ASCON with Hardware Trojans
International Congress of MathematicansThe globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar +1 more source
Green IoT Communications with ASCON-MQTT: A Framework for Secure and Low-Power Connectivity
2025 IEEE 2nd International Conference on Green Industrial Electronics and Sustainable Technologies (GIEST)The growing adoption of of Internet of Things (IoT) devices necessitates secure and energy-efficient communication protocols to address the constraints of limited computational resources and power consumption.
Asim Kumar Panda +5 more
semanticscholar +1 more source
A Cost-Effective Hardware Architecture for ASCON Against DPA Attacks
IEEE International Conference on Consumer ElectronicsASCON is a lightweight encryption algorithm that provides efficient security and performance. This algorithm considers noise resistance, high speed, and low resource requirements, making it suitable for various embedded and lightweight application ...
C. Tsai, Hongchin Lin, Yeong-Kang Lai
semanticscholar +1 more source
New models for the cryptanalysis of ASCON
Designs, Codes and CryptographyMathieu Degré +3 more
semanticscholar +1 more source
Improved Key Recovery Attacks of Ascon
The Cryptographer's Track at RSA ConferenceShuo Peng +3 more
semanticscholar +1 more source
Preimage and collision attacks on reduced Ascon using algebraic strategies
CybersecurityQinggan Fu +3 more
semanticscholar +1 more source

