Results 201 to 210 of about 5,382 (233)
Some of the next articles are maybe not open access.

Masking Based Protection Mechanism for Ascon against CPA Attack

International Symposium on Circuits and Systems
Ascon was selected as the standard of lightweight cryptographic algorithm by NIST in 2023, and it is expected that Ascon will be used in IoT devices in the future.
Sying-Jyan Wang   +2 more
semanticscholar   +1 more source

ASCON Family for Constrained Environments

In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptography solutions for resource-constrained devices.
openaire   +1 more source

Implementation of the Ascon Encryption Algorithm for Secure Industrial IoT Networks

International Conference on Computer, Information and Telecommunication Systems
This paper focuses on Ascon as an encryption algorithm that facilitates secure communications specifically for IoT, focusing particularly on Industrial IoT.
Erich S. Ellsworth   +4 more
semanticscholar   +1 more source

Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations

IACR Commun. Cryptol.
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso, F. Standaert
semanticscholar   +1 more source

ASCON-Hash Core with I/O Serialization for Compact Hardware Implementation

International SoC Design Conference
Ahstract-This paper proposes an I/O-serialized hardware implementation of the permutation core of the NIST-standardized ASCON-Hash: an area-optimized input-output-serialized (IOS) design that time-multiplexes a single 64-bit slice across the state.
Firdaus   +6 more
semanticscholar   +1 more source

ASCON‐MNASNET: An Effective Data Privacy and Security Framework in Cloud Environment

Transactions on Emerging Telecommunications Technologies
As cloud computing continues to proliferate, users are becoming more concerned about the security and privacy of their data, particularly in light of the growing incidences and complexity of cyberattacks.
Jayaprakash Jayachandran   +2 more
semanticscholar   +1 more source

Exact Security Analysis of ASCON

2023
Bishwajit Chakraborty   +2 more
openaire   +1 more source

A Tampering Attack on ASCON with Hardware Trojans

International Congress of Mathematicans
The globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar   +1 more source

A Novel 5-Bit Ascon S-Box With Multiplexer for FPGA Implementation

IEEE Region 10 Conference
The explosive growth of the Internet of Things (IoT) has ushered in an era of smart, interconnected devices yet with it comes an urgent need for robust and efficient security.
Muhammad Hassan, R. Ismail, S. Naziri
semanticscholar   +1 more source

ASCON: A NEW ERA IN LIGHTWEIGHT CRYPTOGRAPHY

This chapter focuses on the Ascon encryption algorithm which is a lightweight cryptographic protocol that has been designed specifically to suit the environments that have limited resources such as the internet of things devices and the embedded systems.
Anil Wurity, L. Sumalatha
openaire   +1 more source

Home - About - Disclaimer - Privacy