Results 21 to 30 of about 5,382 (233)

Fetal central nervous system anomalies according to RT-PCR and trimester of maternal infection with Zika virus: A prospective cohort study. [PDF]

open access: yesActa Obstet Gynecol Scand, 2022
Abstract Introduction In October 2015, an epidemic of Zika began in Colombia’s geographic areas with a high population of mosquitoes of the genus Aedes. We aimed to describe the fetal brain ultrasound findings in pregnant women with active symptoms or a history of symptoms suggestive of Zika virus (ZIKV) infection.
Gutiérrez-Sánchez LÁ   +6 more
europepmc   +2 more sources

Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting

open access: yesIEEE Access, 2023
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang   +3 more
doaj   +1 more source

Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several ...
Yusuke Naito   +2 more
doaj   +1 more source

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit   +3 more
doaj   +1 more source

Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li   +4 more
doaj   +1 more source

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, Volume 2023, Issue 1, 2023., 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear ...
Sugio Nobuyuki, Qichun Wang
wiley   +1 more source

ALICA: A Multi‐S‐Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
With the development of science and technology, IoT devices have already become ubiquitous in the public eye. Through the perception layer, the collected data are displayed or transmitted to the server backend for analysis. Due to the increasing integration of IoT devices into people’s daily lives, privacy issues, such as data leaks, have received more
Jun Ye   +4 more
wiley   +1 more source

New Results on Machine Learning-Based Distinguishers

open access: yesIEEE Access, 2023
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be
Anubhab Baksi   +5 more
doaj   +1 more source

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy