Correlation Power Analysis on Ascon with Multi-Bit Selection Function
: Ascon has recently been selected by NIST as the new standard for lightweight cryptography. This highlights the need to evaluate its resilience against implementation attacks such as Correlation Power Analysis (CPA).
Viet Sang Nguyen +2 more
openalex +2 more sources
Correction: Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
Bhuvaneshwari AJ +3 more
europepmc +3 more sources
Fetal central nervous system anomalies according to RT-PCR and trimester of maternal infection with Zika virus: A prospective cohort study. [PDF]
Abstract Introduction In October 2015, an epidemic of Zika began in Colombia’s geographic areas with a high population of mosquitoes of the genus Aedes. We aimed to describe the fetal brain ultrasound findings in pregnant women with active symptoms or a history of symptoms suggestive of Zika virus (ZIKV) infection.
Gutiérrez-Sánchez LÁ +6 more
europepmc +2 more sources
ASCON Family for Constrained Environments
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptography solutions for resource-constrained devices.
Meltem Sönmez Turan
openalex +2 more sources
NIGERIA ECONOMIC GROWTH AND CAPITAL MARKET DEVELOPMENT: DOES CONTRIBUTORY PENSION SCHEME MATTER?
Whether the contributory pension scheme (CPS) has addressed the shortage of capital for investments, the challenge of full compliance with the system and the shortage of investment outlets spurred the interest to investigate the impact of the CPS on ...
Ayorinde Olutimi AKINWUMI +2 more
doaj +1 more source
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang +3 more
doaj +1 more source
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several ...
Yusuke Naito +2 more
doaj +1 more source
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit +3 more
doaj +1 more source
Improving security in 5G vehicular networks using ASCON and machine learning based NIDS [PDF]
A. J. Bhuvaneshwari +4 more
openalex +2 more sources
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li +4 more
doaj +1 more source

