Results 31 to 40 of about 5,570 (256)

Correlation Power Analysis on Ascon with Multi-Bit Selection Function

open access: goldInternational Conference on Security and Cryptography
: Ascon has recently been selected by NIST as the new standard for lightweight cryptography. This highlights the need to evaluate its resilience against implementation attacks such as Correlation Power Analysis (CPA).
Viet Sang Nguyen   +2 more
openalex   +2 more sources

Fetal central nervous system anomalies according to RT-PCR and trimester of maternal infection with Zika virus: A prospective cohort study. [PDF]

open access: yesActa Obstet Gynecol Scand, 2022
Abstract Introduction In October 2015, an epidemic of Zika began in Colombia’s geographic areas with a high population of mosquitoes of the genus Aedes. We aimed to describe the fetal brain ultrasound findings in pregnant women with active symptoms or a history of symptoms suggestive of Zika virus (ZIKV) infection.
Gutiérrez-Sánchez LÁ   +6 more
europepmc   +2 more sources

ASCON Family for Constrained Environments

open access: gold
In 2023, the National Institute of Standards and Technology (NIST) announced the selection of the Ascon family of algorithms designed by Dobraunig, Eichlseder, Mendel, and Schläffer to provide efficient cryptography solutions for resource-constrained devices.
Meltem Sönmez Turan
openalex   +2 more sources

NIGERIA ECONOMIC GROWTH AND CAPITAL MARKET DEVELOPMENT: DOES CONTRIBUTORY PENSION SCHEME MATTER?

open access: yesGusau Journal of Accounting and Finance, 2023
Whether the contributory pension scheme (CPS) has addressed the shortage of capital for investments, the challenge of full compliance with the system and the shortage of investment outlets spurred the interest to investigate the impact of the CPS on ...
Ayorinde Olutimi AKINWUMI   +2 more
doaj   +1 more source

Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting

open access: yesIEEE Access, 2023
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang   +3 more
doaj   +1 more source

Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several ...
Yusuke Naito   +2 more
doaj   +1 more source

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the authenticated encryption scheme Ascon (designed by Dobraunig, Eichlseder, Mendel, and ...
Raghvendra Rohit   +3 more
doaj   +1 more source

Improving security in 5G vehicular networks using ASCON and machine learning based NIDS [PDF]

open access: goldDiscover Internet of Things
A. J. Bhuvaneshwari   +4 more
openalex   +2 more sources

Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy