Results 231 to 240 of about 5,570 (256)
Some of the next articles are maybe not open access.

Adaptive Chaotic-Neural Ascon Image Encryption with Mish Activation and AI-Driven Key Scheduling for Secure and High-Speed IoT Applications

ACS/IEEE International Conference on Computer Systems and Applications
This paper presents a novel hybrid cryptosystem for image encryption that combines the lightweight Ascon authenticated cypher with neural networks and chaotic systems.
Zaydon L. Ali   +2 more
semanticscholar   +1 more source

A Hybrid Post-Quantum Cryptographic Framework Integrating Kyber-512 and ASCON for Secure IoT Communications

Engineering, Technology & Applied Science Research
The growing dependence on the Internet of Things (IoT) across different sectors requires stringent security solutions to ensure data confidentiality and integrity.
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar   +1 more source

Algebraic Side-Channel Attacks against ISAP's Re-Keying: one Ascon Round May not be Enough for Serial Implementations

IACR Commun. Cryptol.
We investigate the side-channel security of ISAP against Algebraic Side-Channel Attacks (ASCA) in a simulated setting where the Hamming weight leakages of its intermediate computations can be recovered.
Vincent Grosso   +1 more
semanticscholar   +1 more source

ASCON-Hash Core with I/O Serialization for Compact Hardware Implementation

International SoC Design Conference
Ahstract-This paper proposes an I/O-serialized hardware implementation of the permutation core of the NIST-standardized ASCON-Hash: an area-optimized input-output-serialized (IOS) design that time-multiplexes a single 64-bit slice across the state.
Firdaus   +6 more
semanticscholar   +1 more source

ASCON‐MNASNET: An Effective Data Privacy and Security Framework in Cloud Environment

Transactions on Emerging Telecommunications Technologies
As cloud computing continues to proliferate, users are becoming more concerned about the security and privacy of their data, particularly in light of the growing incidences and complexity of cyberattacks.
Jayaprakash Jayachandran   +2 more
semanticscholar   +1 more source

Securing IEC 61850 with Ascon Lightweight Authenticated Encryption: A Case Study

2025 IEEE Future Networks World Forum (FNWF)
Modern power grids use GOOSE and SV protocols for reliable high-speed communications between intelligent electronic devices following the IEC 61850 standard.
Aniket Banerjee, Utsav Banerjee
semanticscholar   +1 more source

Kyber-KEM-Ascon: Benchmarking a Lightweight Post-quantum KEM on IoT Devices

International Symposium on Circuits and Systems
CRYSTALS-Kyber, officially standardized by the U.S. National Institute of Standards and Technology (NIST) in August 2024 as ML-KEM FIPS, is the only post quantum secure key encapsulation mechanism (KEM) standard.
Sahar Shehzadi   +6 more
semanticscholar   +1 more source

A Tampering Attack on ASCON with Hardware Trojans

International Congress of Mathematicans
The globalization of chip supply chain has heightened risks to hardware designs. Cryptographic accelerators, essential for securing communication and data storage, are particularly vulnerable.
Islam Elsadek, E. Tawfik
semanticscholar   +1 more source

ASCON: A NEW ERA IN LIGHTWEIGHT CRYPTOGRAPHY

This chapter focuses on the Ascon encryption algorithm which is a lightweight cryptographic protocol that has been designed specifically to suit the environments that have limited resources such as the internet of things devices and the embedded systems.
Anil Wurity, L. Sumalatha
openaire   +1 more source

Home - About - Disclaimer - Privacy