Results 21 to 30 of about 5,570 (256)
Diving Deep into the Weak Keys of Round Reduced Ascon
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks
Raghvendra Rohit, Santanu Sarkar
doaj +3 more sources
Towards Tight Differential Bounds of Ascon
Being one of the winners of the CAESAR competition and a finalist of the ongoing NIST lightweight cryptography competition, the authenticated encryption with associated data algorithm Ascon has withstood extensive security evaluation.
Rusydi H. Makarim, Raghvendra Rohit
doaj +3 more sources
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD
The recently adopted Ascon standard by NIST offers a lightweight authenticated encryption algorithm for use in resource-constrained cryptographic devices.
Shih-Chun You +3 more
doaj +3 more sources
Enhanced chromium removal from tannery wastewater through electrocoagulation with iron electrodes: Leveraging the Box-Behnken design for optimization [PDF]
This study is focused on reducing total chromium level in tannery wastewater through the electrocoagulation process, in order to comply with the maximum permissible limits (MPL) and to determine the effects from its main operating factors.
Edwar Aguilar-Ascón +2 more
doaj +2 more sources
Improved Differential and Linear Trail Bounds for ASCON
Ascon is a family of cryptographic primitives for authenticated encryption and hashing introduced in 2015. It is selected as one of the ten finalists in the NIST Lightweight Cryptography competition.
Solane El Hirch +3 more
doaj +3 more sources
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh +3 more
doaj +2 more sources
Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon
The increasing adoption of digital technologies, robotic systems, and IoT applications in sectors such as medicine, agriculture, and industry drives a surge in data generation and necessitates secure and efficient encryption.
Gülyeter Öztürk +4 more
doaj +2 more sources
Nonlinear degree of Ascon permutation [PDF]
An estimation of the nonlinear degrees for the forward and inverse permutations of the Ascon algorithm is made in this work. This estimation is made by analyzing higher order differentials. The obtained results of nonlinear degree are significantly lower
Victor Ruzhentsev
doaj +2 more sources
Cryptanalysis: Theory Versus Practice
Most modern cryptanalysis results are obtained through theoretical analysis, often relying on simplifications and idealized assumptions. In this work, we use the parallel computational power of GPUs to experimentally verify a small portion of the ...
Cihangir Tezcan +2 more
doaj +2 more sources

