Results 231 to 240 of about 5,570 (256)
Some of the next articles are maybe not open access.
ACS/IEEE International Conference on Computer Systems and Applications
This paper presents a novel hybrid cryptosystem for image encryption that combines the lightweight Ascon authenticated cypher with neural networks and chaotic systems.
Zaydon L. Ali +2 more
semanticscholar +1 more source
This paper presents a novel hybrid cryptosystem for image encryption that combines the lightweight Ascon authenticated cypher with neural networks and chaotic systems.
Zaydon L. Ali +2 more
semanticscholar +1 more source
Engineering, Technology & Applied Science Research
The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity.
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar +1 more source
The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity.
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar +1 more source
IACR Commun. Cryptol.
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso +1 more
semanticscholar +1 more source
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso +1 more
semanticscholar +1 more source
ASCON-Hash Core with I/O Serialization for Compact Hardware Implementation
International SoC Design ConferenceAhstract-This paper proposes an I/O-serialized hardware implementation of the permutation core of the NIST-standardized ASCON-Hash: an area-optimized input-output-serialized (IOS) design that time-multiplexes a single 64-bit slice across the state.
Firdaus +6 more
semanticscholar +1 more source
ASCON‐MNASNET: An Effective Data Privacy and Security Framework in Cloud Environment
Transactions on Emerging Telecommunications TechnologiesAs cloud computing continues to proliferate, users are becoming more concerned about the security and privacy of their data, particularly in light of the growing incidences and complexity of cyberattacks.
Jayaprakash Jayachandran +2 more
semanticscholar +1 more source
Securing IEC 61850 with Ascon Lightweight Authenticated Encryption: A Case Study
2025 IEEE Future Networks World Forum (FNWF)Modern power grids use GOOSE and SV protocols for reliable high-speed communications between intelligent electronic devices following the IEC 61850 standard.
Aniket Banerjee, Utsav Banerjee
semanticscholar +1 more source
Kyber-KEM-Ascon: Benchmarking a Lightweight Post-quantum KEM on IoT Devices
International Symposium on Circuits and SystemsCRYSTALS-Kyber, officially standardized by the U.S. National Institute of Standards and Technology (NIST) in August 2024 as ML-KEM FIPS, is the only post quantum secure key encapsulation mechanism (KEM) standard.
Sahar Shehzadi +6 more
semanticscholar +1 more source
A Tampering Attack on ASCON with Hardware Trojans
International Congress of MathematicansThe globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar +1 more source
ASCON: A NEW ERA IN LIGHTWEIGHT CRYPTOGRAPHY
This chapter focuses on the Ascon encryption algorithm which is a lightweight cryptographic protocol that has been designed specifically to suit the environments that have limited resources such as the internet of things devices and the embedded systems.Anil Wurity, L. Sumalatha
openaire +1 more source

