Results 211 to 220 of about 5,382 (233)
Some of the next articles are maybe not open access.
Hardware Implementation Analysis of Ascon: A Structured Review
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)The swift development of the Internet of Things (IoT) is leading to the development ofa multitude of intelligent devices, with profound implementation for security. In addition to theirpurported security level, IoT devices typically include limited resources, including minimal computationalpower, limited memory, and restricted battery capacity ...
Muhammad Hafiz Abu Hassan +2 more
openaire +1 more source
Nonlinearity Improvement for Ascon Substitution Box
International Journal of TelecommunicationsMohamed Bakr, Noha Korany
openaire +1 more source
Side-Channel Collision Attacks Against ASCON
2025 Design, Automation & Test in Europe Conference (DATE)Hao Zhang +3 more
openaire +1 more source
Electromagnetic Fault Injection Attack onĀ ASCON Using ChipShouter
2023Varun Narayanan, Sriram Sankaran
openaire +1 more source
Analysis of Ascon, DryGASCON, and Shamash Permutations
Ascon, DryGASCON, and Shamash are submissions to NIST's lightweight cryptography standardization process and have similar designs. We analyze these algorithms against subspace trails, truncated differentials, and differential-linear distinguishers.openaire +1 more source
Preimage attacks on reduced-round Ascon-Xof
Designs, Codes and CryptographySeungjun Baek, Giyoon Kim, Jongsung Kim
openaire +1 more source
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
IACR Cryptology ePrint ArchiveMarcel Nageler +2 more
semanticscholar +1 more source

