Results 191 to 200 of about 5,382 (233)
Some of the next articles are maybe not open access.
International Conference Control and Robots
The Integration of Internet of Things (IoT) technologies into pharmaceutical supply chains has led to significant gains in tracking accuracy and overall operational efficiency.
Bashayr Alshammari +1 more
semanticscholar +1 more source
The Integration of Internet of Things (IoT) technologies into pharmaceutical supply chains has led to significant gains in tracking accuracy and overall operational efficiency.
Bashayr Alshammari +1 more
semanticscholar +1 more source
Ascon hardware implementations and side-channel evaluation
Microprocessors and Microsystems, 2017Abstract Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical ...
Hannes Gross +3 more
openaire +1 more source
An Optimized Hardware Implementation of ASCON With Power Analysis Attack Resistance
International journal of circuit theory and applicationsIn recent times, the security of data collected and transmitted by IoT nodes has gained high importance. Hence, a lightweight cryptographic algorithm is required to be implemented in such nodes.
P. Ramadass, Saravanan Paramasivam
semanticscholar +1 more source
Kyber-KEM-Ascon: Benchmarking a Lightweight Post-quantum KEM on IoT Devices
International Symposium on Circuits and SystemsCRYSTALS-Kyber, officially standardized by the U.S. National Institute of Standards and Technology (NIST) in August 2024 as ML-KEM FIPS, is the only post quantum secure key encapsulation mechanism (KEM) standard.
Sahar Shehzadi +6 more
semanticscholar +1 more source
RECO-ASCON: Reconfigurable ASCON hash functions for IoT applications
Integration, 2023Mohamed El-Hadedy +6 more
openaire +1 more source
Low Entropy Masking Protection Scheme for Ascon Cipher to Counteract Side-Channel Attacks
Conference on Design of Circuits and Integrated SystemsSince NIST selected the Ascon cipher as a finalist in the lightweight cipher competition for constrained environments in February 2023, the cipher has been a focus of researchers, industry and government.
Erica Tena-Sánchez +4 more
semanticscholar +1 more source
ACS/IEEE International Conference on Computer Systems and Applications
This paper advances a novel encryption scheme using the integration of transformer neural networks and chaotic systems to enhance security for resource-constrained IoT devices.
Zaydon L. Ali +2 more
semanticscholar +1 more source
This paper advances a novel encryption scheme using the integration of transformer neural networks and chaotic systems to enhance security for resource-constrained IoT devices.
Zaydon L. Ali +2 more
semanticscholar +1 more source
Green IoT Communications with ASCON-MQTT: A Framework for Secure and Low-Power Connectivity
2025 IEEE 2nd International Conference on Green Industrial Electronics and Sustainable Technologies (GIEST)The growing adoption of of Internet of Things (IoT) devices necessitates secure and energy-efficient communication protocols to address the constraints of limited computational resources and power consumption.
Asim Kumar Panda +5 more
semanticscholar +1 more source
Engineering, Technology & Applied Science Research
The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity.
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar +1 more source
The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity.
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar +1 more source
Assessing Gaston: Side-channel Security and Hardware Cost Comparison with Ascon-p
IEEE Computer Society Annual Symposium on VLSIAt Crypto 2023, El hirch et al. introduced the cryptographic permutation GASTON. They showed that by using the same number of bitwise operations of ASCON-p - the permutation underlying the new NIST standard ASCON for lightweight authenticated encryption -
P. A. Eliasi, Silvia Mella, L. Batina
semanticscholar +1 more source

