Results 241 to 250 of about 5,570 (256)
Some of the next articles are maybe not open access.
Analysis of Ascon, DryGASCON, and Shamash Permutations
Ascon, DryGASCON, and Shamash are submissions to NIST's lightweight cryptography standardization process and have similar designs. We analyze these algorithms against subspace trails, truncated differentials, and differential-linear distinguishers.openaire +1 more source
Preimage attacks on reduced-round Ascon-Xof
Designs, Codes and CryptographySeungjun Baek, Giyoon Kim, Jongsung Kim
openaire +1 more source
Quantum circuit implementations of lightweight authenticated encryption ASCON
The Journal of SupercomputingYuanmeng Zheng +3 more
openaire +1 more source
Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V
IACR Cryptology ePrint ArchiveLinus Mainka, K. Papagiannopoulos
semanticscholar +1 more source
2024 17th International Conference on Information Security and Cryptology (ISCTürkiye)
openaire +1 more source
openaire +1 more source
Formal Verification of ASCON Cipher using JasperGold
2024 International Conference on Smart Electronics and Communication Systems (ISENSE)Saravanan P +3 more
openaire +1 more source
Preimage-type Attacks for Reduced Ascon-Hash: Application to Ed25519
IACR Cryptology ePrint ArchiveMarcel Nageler +2 more
semanticscholar +1 more source

