Fetal central nervous system anomalies according to RT-PCR and trimester of maternal infection with Zika virus: A prospective cohort study. [PDF]
Abstract Introduction In October 2015, an epidemic of Zika began in Colombia’s geographic areas with a high population of mosquitoes of the genus Aedes. We aimed to describe the fetal brain ultrasound findings in pregnant women with active symptoms or a history of symptoms suggestive of Zika virus (ZIKV) infection.
Gutiérrez-Sánchez LÁ +6 more
europepmc +2 more sources
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang +3 more
doaj +1 more source
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several ...
Yusuke Naito +2 more
doaj +1 more source
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit +3 more
doaj +1 more source
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li +4 more
doaj +1 more source
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear ...
Sugio Nobuyuki, Qichun Wang
wiley +1 more source
ALICA: A Multi‐S‐Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure
With the development of science and technology, IoT devices have already become ubiquitous in the public eye. Through the perception layer, the collected data are displayed or transmitted to the server backend for analysis. Due to the increasing integration of IoT devices into people’s daily lives, privacy issues, such as data leaks, have received more
Jun Ye +4 more
wiley +1 more source
New Results on Machine Learning-Based Distinguishers
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be
Anubhab Baksi +5 more
doaj +1 more source
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri +3 more
wiley +1 more source

