Results 221 to 230 of about 5,570 (256)
Some of the next articles are maybe not open access.
Optimized and Reconfigurable Hardware Design for ASCON AEAD and Hash Standards
International Symposium on Circuits and SystemsNIST has finalized LWC standardization process by selecting ASCON as the new standard. ASCON is a versatile algorithm supporting two primary functions: AEAD and HASH.
Islam Elsadek, E. Tawfik
semanticscholar +1 more source
Statistical Fault Attacks on ASCON Using Improved Square Euclidean Imbalance
IEEE Internet of Things JournalIn current environment of frequent information exchange between Internet of Things (IoT) devices, traditional cryptographic algorithms often fail to effectively play a role in resource-limited electronic devices, which highlights the importance of ...
Guosheng Xu +4 more
semanticscholar +1 more source
Data Communication Security for FANETs Using Ascon Lightweight Cryptography
2025 10th IEEE International Conference on Integrated Circuits, Design, and Verification (ICDV)Flying Ad-hoc Network (FANET) is a wireless network designed for Unmanned Aerial Vehicles (UAVs). FANET allows many UAVs to connect and exchange data with each other and with ground devices without the need for a fixed network infrastructure.
Huyen-Trang Pham-Thi +2 more
semanticscholar +1 more source
ACS/IEEE International Conference on Computer Systems and Applications
This paper introduces the Enhanced AsconNeuroMish Framework (EANMF), a novel image encryption approach specifically designed for Internet of Things (IoT) environments.
Zaydon L. Ali
semanticscholar +1 more source
This paper introduces the Enhanced AsconNeuroMish Framework (EANMF), a novel image encryption approach specifically designed for Internet of Things (IoT) environments.
Zaydon L. Ali
semanticscholar +1 more source
Ascon hardware implementations and side-channel evaluation
Microprocessors and Microsystems, 2017Abstract Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the CAESAR candidate Ascon is implemented in hardware and optimized for different typical ...
Hannes Gross +3 more
openaire +1 more source
Enhancing Security of MQTT-based IoHT System Using ASCON and ZWC
2025 12th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)The Internet of Health Things (IoHT) enables real-time patient monitoring and remote diagnostics through interconnected medical devices. As widely used protocol in IoHT, the MQTT requires a security approach that can conceal private information and ...
Subroto Fajar Siddiq +2 more
semanticscholar +1 more source
RECO-ASCON: Reconfigurable ASCON hash functions for IoT applications
Integration, 2023Mohamed El-Hadedy +6 more
openaire +1 more source
International Conference on Computing, Communication and Automation
Due to the growing number of electric vehicles (EVs), managing enormous volumes of electricity transaction data has emerged as a major challenge that requires attention.
Farzana Kabir +2 more
semanticscholar +1 more source
Due to the growing number of electric vehicles (EVs), managing enormous volumes of electricity transaction data has emerged as a major challenge that requires attention.
Farzana Kabir +2 more
semanticscholar +1 more source
A Hybrid ASCON–Kyber Lightweight Framework Using MQTT Protocol for Constrained Devices
2025 12th International Conference on Electrical and Electronics Engineering (ICEEE)The cryptographic community is preparing security countermeasures against quantum computing and the principle of superposition. Rapid advances and breakthroughs in quantum computing will break conventional cipher schemes by halving brute-force attack ...
Fadi Suleiman, Khalid Javeed
semanticscholar +1 more source
A Novel ASCON ECB with 64-Bit Block Size for Energy-Harvesting Beat Sensors
International Symposium on Communications and Information TechnologiesWith the rapid growth of Internet of Things (IoT) devices, particularly energy-harvesting sensors, ensuring data security while conserving power has become a critical challenge. Traditional encryption techniques often demand excessive energy, making them
Anh-Duc Mai +3 more
semanticscholar +1 more source

