Results 11 to 20 of about 5,382 (233)
New Differential-Based Distinguishers for Ascon via Constraint Programming
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self-evaluation and third-party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several ...
Chan Song, Wenling Wu, Lei Zhang
doaj +3 more sources
Ascon v1.2: Lightweight Authenticated Encryption and Hashing [PDF]
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig +3 more
semanticscholar +4 more sources
Exploring Differential-Based Distinguishers and Forgeries for ASCON
Automated methods have become crucial components when searching for distinguishers against symmetric-key cryptographic primitives. While MILP and SAT solvers are among the most popular tools to model ciphers and perform cryptanalysis, other methods with ...
David Gerault +2 more
doaj +3 more sources
Conditional Cube Attack on Round-Reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al.
Zheng Li, Xiaoyang Dong, Xiaoyun Wang
doaj +4 more sources
Practical Cube Attack against Nonce-Misused Ascon
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort.
Jules Baudrin +2 more
doaj +2 more sources
Towards Tight Differential Bounds of Ascon
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cryptography competition, the authenticated encryption with associated data algorithm Ascon has withstood extensive security evaluation.
Rusydi H. Makarim, Raghvendra Rohit
doaj +3 more sources
Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon
The increasing adoption of digital technologies, robotic systems, and IoT applications in sectors such as medicine, agriculture, and industry drives a surge in data generation and necessitates secure and efficient encryption.
Gülyeter Öztürk +4 more
doaj +2 more sources
The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management.
Hiba Belfqih, Abderrahim Abdellaoui
doaj +2 more sources
Nonlinear degree of Ascon permutation [PDF]
An estimation of the nonlinear degrees for the forward and inverse permutations of the Ascon algorithm is made in this work. This estimation is made by analyzing higher order differentials. The obtained results of nonlinear degree are significantly lower
Victor Ruzhentsev
doaj +2 more sources
NIGERIA ECONOMIC GROWTH AND CAPITAL MARKET DEVELOPMENT: DOES CONTRIBUTORY PENSION SCHEME MATTER?
Whether the contributory pension scheme (CPS) has addressed the shortage of capital for investments, the challenge of full compliance with the system and the shortage of investment outlets spurred the interest to investigate the impact of the CPS on ...
Ayorinde Olutimi AKINWUMI +2 more
doaj +1 more source

