Results 21 to 30 of about 5,570 (256)

Diving Deep into the Weak Keys of Round Reduced Ascon

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks
Raghvendra Rohit, Santanu Sarkar
doaj   +3 more sources

Towards Tight Differential Bounds of Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cryptography competition, the authenticated encryption with associated data algorithm Ascon has withstood extensive security evaluation.
Rusydi H. Makarim, Raghvendra Rohit
doaj   +3 more sources

Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption algorithm for use in resource-constrained cryptographic devices.
Shih-Chun You   +3 more
doaj   +3 more sources

Enhanced chromium removal from tannery wastewater through electrocoagulation with iron electrodes: Leveraging the Box-Behnken design for optimization [PDF]

open access: yesHeliyon
This study is focused on reducing total chromium level in tannery wastewater through the electrocoagulation process, in order to comply with the maximum permissible limits (MPL) and to determine the effects from its main operating factors.
Edwar Aguilar-Ascón   +2 more
doaj   +2 more sources

Improved Differential and Linear Trail Bounds for ASCON

open access: diamondIACR Transactions on Symmetric Cryptology, 2022
Ascon is a family of cryptographic primitives for authenticated encryption and hashing introduced in 2015. It is selected as one of the ten finalists in the NIST Lightweight Cryptography competition.
Solane El Hirch   +3 more
doaj   +3 more sources

Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH

open access: goldMathematics
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh   +3 more
doaj   +2 more sources

Exact Security Analysis of ASCON [PDF]

open access: bronze, 2023
Bishwajit Chakraborty   +2 more
openalex   +2 more sources

Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon

open access: yesApplied Sciences
The increasing adoption of digital technologies, robotic systems, and IoT applications in sectors such as medicine, agriculture, and industry drives a surge in data generation and necessitates secure and efficient encryption.
Gülyeter Öztürk   +4 more
doaj   +2 more sources

Nonlinear degree of Ascon permutation [PDF]

open access: yesInternational Journal of Electronics and Telecommunications
An estimation of the nonlinear degrees for the forward and inverse permutations of the Ascon algorithm is made in this work. This estimation is made by analyzing higher order differentials. The obtained results of nonlinear degree are significantly lower
Victor Ruzhentsev
doaj   +2 more sources

Cryptanalysis: Theory Versus Practice

open access: yesIACR Transactions on Symmetric Cryptology
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy