Results 41 to 50 of about 865 (50)
Some of the next articles are maybe not open access.

Nonlinear degree of Ascon permutation

International Journal of Electronics and Telecommunications
An estimation of the nonlinear degrees for the forward and inverse permutations of the Ascon algorithm is made in this work. This estimation is made by analyzing higher order differentials. The obtained results of nonlinear degree are significantly lower
Victor Ruzhentsev
semanticscholar   +1 more source

A Severe Vulnerability and an Effective Defense Against DFA on Ascon

ACM Transactions on Embedded Computing Systems
Differential Fault Attack (DFA) is a powerful cryptanalytic technique for recovering cryptographic keys by exploiting computational faults. At Indocrypt 2024, the first DFA on Ascon was introduced using a bit-flip fault model to recover a 64-bit key ...
Smita Das   +2 more
semanticscholar   +1 more source

Kyber-KEM-Ascon: Benchmarking a Lightweight Post-quantum KEM on IoT Devices

International Symposium on Circuits and Systems
CRYSTALS-Kyber, officially standardized by the U.S. National Institute of Standards and Technology (NIST) in August 2024 as ML-KEM FIPS, is the only post quantum secure key encapsulation mechanism (KEM) standard.
Sahar Shehzadi   +6 more
semanticscholar   +1 more source

An Optimized Hardware Implementation of ASCON With Power Analysis Attack Resistance

International journal of circuit theory and applications
In recent times, the security of data collected and transmitted by IoT nodes has gained high importance. Hence, a lightweight cryptographic algorithm is required to be implemented in such nodes.
P. Ramadass, Saravanan Paramasivam
semanticscholar   +1 more source

A Tampering Attack on ASCON with Hardware Trojans

International Congress of Mathematicans
The globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar   +1 more source

Green IoT Communications with ASCON-MQTT: A Framework for Secure and Low-Power Connectivity

2025 IEEE 2nd International Conference on Green Industrial Electronics and Sustainable Technologies (GIEST)
The growing adoption of of Internet of Things (IoT) devices necessitates secure and energy-efficient communication protocols to address the constraints of limited computational resources and power consumption.
Asim Kumar Panda   +5 more
semanticscholar   +1 more source

A Cost-Effective Hardware Architecture for ASCON Against DPA Attacks

IEEE International Conference on Consumer Electronics
ASCON is a lightweight encryption algorithm that provides efficient security and performance. This algorithm considers noise resistance, high speed, and low resource requirements, making it suitable for various embedded and lightweight application ...
C. Tsai, Hongchin Lin, Yeong-Kang Lai
semanticscholar   +1 more source

New models for the cryptanalysis of ASCON

Designs, Codes and Cryptography
Mathieu Degré   +3 more
semanticscholar   +1 more source

Improved Key Recovery Attacks of Ascon

The Cryptographer's Track at RSA Conference
Shuo Peng   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy