Results 211 to 220 of about 5,382 (233)
Some of the next articles are maybe not open access.

Hardware Implementation Analysis of Ascon: A Structured Review

Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)
The swift development of the Internet of Things (IoT) is leading to the development ofa multitude of intelligent devices, with profound implementation for security. In addition to theirpurported security level, IoT devices typically include limited resources, including minimal computationalpower, limited memory, and restricted battery capacity ...
Muhammad Hafiz Abu Hassan   +2 more
openaire   +1 more source

Nonlinearity Improvement for Ascon Substitution Box

International Journal of Telecommunications
Mohamed Bakr, Noha Korany
openaire   +1 more source

Ascone, Vicente

2001
openaire   +1 more source

Side-Channel Collision Attacks Against ASCON

2025 Design, Automation & Test in Europe Conference (DATE)
Hao Zhang   +3 more
openaire   +1 more source

Analysis of Ascon, DryGASCON, and Shamash Permutations

Ascon, DryGASCON, and Shamash are submissions to NIST's lightweight cryptography standardization process and have similar designs. We analyze these algorithms against subspace trails, truncated differentials, and differential-linear distinguishers.
openaire   +1 more source

Preimage attacks on reduced-round Ascon-Xof

Designs, Codes and Cryptography
Seungjun Baek, Giyoon Kim, Jongsung Kim
openaire   +1 more source

Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519

IACR Cryptology ePrint Archive
Marcel Nageler   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy