Results 211 to 220 of about 5,570 (256)
Some of the next articles are maybe not open access.
2015
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds.
Christoph Dobraunig +3 more
openaire +1 more source
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds.
Christoph Dobraunig +3 more
openaire +1 more source
ACM Computing Surveys
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023. Lightweight cryptography plays a vital role insecuring resource-constrained embedded systems such as deeply-embedded systems (implantable and ...
Jasmine Kaur +3 more
semanticscholar +1 more source
7-Stage Pipelined Architecture of ASCON for Resource Constraint Devices
IEEE Embedded Systems LettersAscon is an intended lightweight algorithm designed to deliver efficiency and security for resource-constrained Internet of Things (IoT) devices. This letter presents a field-programmable gate array (FPGA) implementation of the pipelined architecture of ...
A. J. Bhuvaneshwari +4 more
semanticscholar +1 more source
Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
2020 IEEE 33rd International System-on-Chip Conference (SOCC), 2020Ascon algorithm was selected in 2019, in the CAESAR competition as the first option for lightweight applications as an alternative to AES-GCM for authenticated encryption. As with other encryption algorithms, Ascon relies on some parameters and security assumptions to guarantee its security.
Jorge E. Duarte-Sanchez, Basel Halak
openaire +1 more source
Ascon on FPGA: Post-Quantum Safe Authenticated Encryption with Replay Protection for IoT
ElectronicsAscon is a family of lightweight cryptographic algorithms designed for Authenticated Encryption with Associated Data (AEAD), hashing, and Extendable Output Functions (XOFs) in resource-constrained environments.
Meera Gladis Kurian, Yuhua Chen
semanticscholar +1 more source
State-of-the-Art ASCON ASIC Achieving 4.3 Gbps@0.8V and 3.5Tb/J@0.6V Outperforming AES by 25 Times
IEEE Transactions on Circuits and Systems Part 1: Regular PapersNIST selected ASCON as the standard Lightweight Cryptography (LWC) algorithm in 2023. ASCON’s implementations promise bringing lightweight Authenticated Encryption (AEAD) to resource-constrained devices surpassing Advanced Encryption Standard (AES ...
Islam Elsadek +9 more
semanticscholar +1 more source
IEEE transactions on consumer electronics
In the current era, the deployment of video surveillance systems $(VSSs)$ is becoming a common practice in society for properly maintaining laws and order in public and private places.
Mahesh Chaurasia +3 more
semanticscholar +1 more source
In the current era, the deployment of video surveillance systems $(VSSs)$ is becoming a common practice in society for properly maintaining laws and order in public and private places.
Mahesh Chaurasia +3 more
semanticscholar +1 more source
A Compute-in-Memory Ascon Implementation Based on a Novel 11T SRAM Processing Macro
International Symposium on Low-Power and High-Speed ChipsOver the past decade, a new paradigm of computing called Compute-In-Memory (CIM) has emerged wherein traditional memory circuits, such as static random access memories (SRAMs), can be modified to perform computations on data insitu, leading to enhanced ...
Mark Lee, Chris Clark, S. Mukhopadhyay
semanticscholar +1 more source
Evaluating Ascon in Secure Multi-Party Computation using Reverse Multiplication-Friendly Embeddings
IACR Cryptology ePrint ArchiveWe present the first systematic study on communication-efficient evaluation of the lightweight cipher family Ascon within secure multi-party computation (MPC).
Peter Schwarz +3 more
semanticscholar +1 more source

