Results 201 to 210 of about 5,382 (233)
Some of the next articles are maybe not open access.
Masking Based Protection Mechanism for Ascon against CPA Attack
International Symposium on Circuits and SystemsAscon was selected as the standard of lightweight cryptographic algorithm by NIST in 2023, and it is expected that Ascon will be used in IoT devices in the future.
Sying-Jyan Wang +2 more
semanticscholar +1 more source
ASCON Family for Constrained Environments
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptography solutions for resource-constrained devices.openaire +1 more source
Implementation of the Ascon Encryption Algorithm for Secure Industrial IoT Networks
International Conference on Computer, Information and Telecommunication SystemsThis paper focuses on Ascon as an encryption algorithm that facilitates secure communications specifically for IoT, focusing particularly on Industrial IoT.
Erich S. Ellsworth +4 more
semanticscholar +1 more source
IACR Commun. Cryptol.
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso, F. Standaert
semanticscholar +1 more source
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso, F. Standaert
semanticscholar +1 more source
ASCON-Hash Core with I/O Serialization for Compact Hardware Implementation
International SoC Design ConferenceAhstract-This paper proposes an I/O-serialized hardware implementation of the permutation core of the NIST-standardized ASCON-Hash: an area-optimized input-output-serialized (IOS) design that time-multiplexes a single 64-bit slice across the state.
Firdaus +6 more
semanticscholar +1 more source
ASCON‐MNASNET: An Effective Data Privacy and Security Framework in Cloud Environment
Transactions on Emerging Telecommunications TechnologiesAs cloud computing continues to proliferate, users are becoming more concerned about the security and privacy of their data, particularly in light of the growing incidences and complexity of cyberattacks.
Jayaprakash Jayachandran +2 more
semanticscholar +1 more source
A Tampering Attack on ASCON with Hardware Trojans
International Congress of MathematicansThe globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar +1 more source
A Novel 5-Bit Ascon S-Box With Multiplexer for FPGA Implementation
IEEE Region 10 ConferenceThe explosive growth of the Internet of Things (IoT) has ushered in an era of smart, interconnected devices yet with it comes an urgent need for robust and efficient security.
Muhammad Hassan, R. Ismail, S. Naziri
semanticscholar +1 more source
ASCON: A NEW ERA IN LIGHTWEIGHT CRYPTOGRAPHY
This chapter focuses on the Ascon encryption algorithm which is a lightweight cryptographic protocol that has been designed specifically to suit the environments that have limited resources such as the internet of things devices and the embedded systems.Anil Wurity, L. Sumalatha
openaire +1 more source

