Results 171 to 180 of about 5,382 (233)
The design and implementation of lightweight‐oriented ciphers on hardware has turned into an urgent matter with the expansive field of Internet of Things (IoT) and the ever increasing presence of small electronic devices that require fast and secure ...
Miguel Martín-González +3 more
semanticscholar +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Ascon-Based Lightweight Cryptography Standards for Constrained Devices
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained ...
Meltem Sonmez Turan
semanticscholar +2 more sources
Improved Key Recovery Attacks of Ascon
The Cryptographer's Track at RSA ConferenceShuo Peng +3 more
semanticscholar +2 more sources
New models for the cryptanalysis of ASCON
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mathieu Degré +3 more
semanticscholar +3 more sources
Cryptanalysis of round-reduced ASCON
Science China Information Sciences, 2016ASCON是CAESAR竞赛的候选认证加密算法之一。在CT-RSA 2015上, 其设计者恢复了含有6轮初始化阶段的ASCON算法的密钥, 并给出了3/4轮的标签生成阶段的伪造攻击, 该伪造需求2^33/2^101个消息。这篇论文对包含7轮初始化阶段和5轮明文处理阶段的简化版ASCON算法执行密钥恢复攻击。除此之外, 我们对4/5/6轮的标签生成阶段建立了伪造, 所需数据量为2^9/2^17/2^33。该伪造相对之前具有实际攻击复杂度。
Yanbin Li +3 more
openaire +1 more source
ASIC Implementation of ASCON Lightweight Cryptography for IoT Applications
IEEE Transactions on Circuits and Systems - II - Express BriefsThe number of IoT devices has grown significantly in recent years, and edge computing in IoT is considered a new and growing trend in the technology industry.
Khai-Duy Nguyen +5 more
semanticscholar +1 more source
2015
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds.
Christoph Dobraunig +3 more
openaire +1 more source
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds.
Christoph Dobraunig +3 more
openaire +1 more source
ACM Computing Surveys
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
7-Stage Pipelined Architecture of ASCON for Resource Constraint Devices
IEEE Embedded Systems LettersAscon is an intended lightweight algorithm designed to deliver efficiency and security for resource-constrained Internet of Things (IoT) devices. This letter presents a field-programmable gate array (FPGA) implementation of the pipelined architecture of ...
A. Bhuvaneshwari +4 more
semanticscholar +1 more source

