Results 41 to 50 of about 5,382 (233)

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher   +2 more
doaj   +1 more source

Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things

open access: yes物联网学报, 2022
ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and ...
Jing WANG   +4 more
doaj   +2 more sources

Ecotoxicology of Mercerized Cellulose–Treated Tannery Effluents Using Salvinia auriculata (Salviniaceae) as a Bioindicator

open access: yesEnvironmental Toxicology, Volume 40, Issue 12, Page 1358-1374, December 2025.
ABSTRACT Given the growing concern over the environmental impacts of industrial effluents, particularly from tanneries, assessing the ecotoxicological risks associated with these effluents, even after remediation treatments, is crucial. Therefore, we aimed to evaluate the potential effects of exposure to raw and treated tannery effluents with ...
Alex Rodrigues Gomes   +9 more
wiley   +1 more source

Evaluating Ascon Hardware on 7-Series FPGA Devices

open access: yesIEEE Access
The applications regarding the Internet of Things (IoT) demand lightweight and robust cryptographic solutions to ensure authenticated encryption with associated data (AEAD). Also, the lightweight cryptographic solutions that provide data confidentiality,
Adel R. Alharbi   +5 more
doaj   +1 more source

Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma

open access: yesEngineering Reports, Volume 7, Issue 7, July 2025.
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley   +1 more source

Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings

open access: yesIACR Transactions on Symmetric Cryptology
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj   +1 more source

A Hardware Architecture of NIST Lightweight Cryptography Applied in IPSec to Secure High-Throughput Low-Latency IoT Networks

open access: yesIEEE Access, 2023
The Internet of Things (IoT) has rapidly grown in recent years, making it an integral part of many areas of our lives. Many IoT networks require high data throughput and low latency, allowing for real-time communication and data transmission, enabling ...
Sy-Nam Tran   +2 more
doaj   +1 more source

International visibility and accessibility of articles in the Proceedings of Fisheries Society of Nigeria through the Aquatic Commons repository [PDF]

open access: yes, 2010
The major problem of published information in the developing countries particularly in Africa is lack of international visibility and accessibility to world community of scientists. This has implications on both the articles and their authors.
Ibeun, M.O.
core  

Characterization of Portable Ultra‐Low Field MRI Scanners for Multi‐Center Structural Neuroimaging

open access: yesHuman Brain Mapping, Volume 46, Issue 8, June 1, 2025.
A global study on quality control of portable, ultra‐low field MRI systems within the UNITY network. Cross‐sectional and longitudinal data are presented together with analysis of factors influencing image noise, contrast, and distortions. ABSTRACT The lower infrastructure requirements of portable ultra‐low field MRI (ULF‐MRI) systems have enabled their
Emil Ljungberg   +33 more
wiley   +1 more source

Improved Differential and Linear Trail Bounds for ASCON

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Ascon is a family of cryptographic primitives for authenticated encryption and hashing introduced in 2015. It is selected as one of the ten finalists in the NIST Lightweight Cryptography competition.
Solane El Hirch   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy