Results 201 to 210 of about 5,570 (256)

A new sponge from the Marjum Formation of Utah documents the Cambrian origin of the hexactinellid body plan. [PDF]

open access: yesR Soc Open Sci
Del Mouro L   +7 more
europepmc   +1 more source

Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
The design and implementation of lightweight‐oriented ciphers on hardware has turned into an urgent matter with the expansive field of Internet of Things (IoT) and the ever increasing presence of small electronic devices that require fast and secure ...
Miguel Martín-González   +3 more
semanticscholar   +2 more sources

Side-Channel Collision Attacks Against ASCON

2025 Design, Automation & Test in Europe Conference (DATE)
Side-channel attack poses a significant threat to the security of electronic devices, particularly IoT/AIoT terminals. By leveraging side-channel leakages, collision attacks can efficiently extract the secret keys from cryptographic devices while ...
Hao Zhang   +3 more
semanticscholar   +2 more sources

Ascon-Based Lightweight Cryptography Standards for Constrained Devices


In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptographic solutions for resource-constrained ...
Meltem Sonmez Turan
semanticscholar   +2 more sources

Differential Cryptanalysis using Reinforcement Learning on round-reduced Ascon

2025 International Conference on Platform Technology and Service (PlatCon)
Recently, the automated differential trail search methods are well knowns. Especially for Ascon, using constraint-solving techniques such as MILP, SAT, and CP, which encode mathematical constraints into programs to find optimal solutions.
Min-Haeng Cho, Changhoon Lee
semanticscholar   +2 more sources

Improved Key Recovery Attacks of Ascon

The Cryptographer's Track at RSA Conference
Shuo Peng   +3 more
semanticscholar   +2 more sources

Hardware Implementation Analysis of Ascon: A Structured Review

Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)
The swift development of the Internet of Things (IoT) is leading to the development of a multitude of intelligent devices, with profound implementation for security.
Muhammad Hafiz Abu Hassan   +2 more
semanticscholar   +2 more sources

New models for the cryptanalysis of ASCON

open access: yesDesigns, Codes and Cryptography
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mathieu Degré   +3 more
semanticscholar   +3 more sources

Cryptanalysis of round-reduced ASCON

Science China Information Sciences, 2016
ASCON是CAESAR竞赛的候选认证加密算法之一。在CT-RSA 2015上, 其设计者恢复了含有6轮初始化阶段的ASCON算法的密钥, 并给出了3/4轮的标签生成阶段的伪造攻击, 该伪造需求2^33/2^101个消息。这篇论文对包含7轮初始化阶段和5轮明文处理阶段的简化版ASCON算法执行密钥恢复攻击。除此之外, 我们对4/5/6轮的标签生成阶段建立了伪造, 所需数据量为2^9/2^17/2^33。该伪造相对之前具有实际攻击复杂度。
Yanbin Li   +3 more
openaire   +1 more source

ASIC Implementation of ASCON Lightweight Cryptography for IoT Applications

IEEE Transactions on Circuits and Systems - II - Express Briefs
The number of IoT devices has grown significantly in recent years, and edge computing in IoT is considered a new and growing trend in the technology industry.
Khai-Duy Nguyen   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy