Results 41 to 50 of about 5,382 (233)
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher +2 more
doaj +1 more source
ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and ...
Jing WANG +4 more
doaj +2 more sources
ABSTRACT Given the growing concern over the environmental impacts of industrial effluents, particularly from tanneries, assessing the ecotoxicological risks associated with these effluents, even after remediation treatments, is crucial. Therefore, we aimed to evaluate the potential effects of exposure to raw and treated tannery effluents with ...
Alex Rodrigues Gomes +9 more
wiley +1 more source
Evaluating Ascon Hardware on 7-Series FPGA Devices
The applications regarding the Internet of Things (IoT) demand lightweight and robust cryptographic solutions to ensure authenticated encryption with associated data (AEAD). Also, the lightweight cryptographic solutions that provide data confidentiality,
Adel R. Alharbi +5 more
doaj +1 more source
Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley +1 more source
Improved Conditional Cube Attacks on Ascon AEADs in Nonce-Respecting Settings
The best-known distinguisher on 7-round Ascon-128 and Ascon-128a AEAD uses a 60-dimensional cube where the nonce bits are set to be equal in the third and fourth rows of the Ascon state during initialization (Rohit et al. ToSC 2021/1).
Kai Hu
doaj +1 more source
The Internet of Things (IoT) has rapidly grown in recent years, making it an integral part of many areas of our lives. Many IoT networks require high data throughput and low latency, allowing for real-time communication and data transmission, enabling ...
Sy-Nam Tran +2 more
doaj +1 more source
International visibility and accessibility of articles in the Proceedings of Fisheries Society of Nigeria through the Aquatic Commons repository [PDF]
The major problem of published information in the developing countries particularly in Africa is lack of international visibility and accessibility to world community of scientists. This has implications on both the articles and their authors.
Ibeun, M.O.
core
Characterization of Portable Ultra‐Low Field MRI Scanners for Multi‐Center Structural Neuroimaging
A global study on quality control of portable, ultra‐low field MRI systems within the UNITY network. Cross‐sectional and longitudinal data are presented together with analysis of factors influencing image noise, contrast, and distortions. ABSTRACT The lower infrastructure requirements of portable ultra‐low field MRI (ULF‐MRI) systems have enabled their
Emil Ljungberg +33 more
wiley +1 more source
Improved Differential and Linear Trail Bounds for ASCON
Ascon is a family of cryptographic primitives for authenticated encryption and hashing introduced in 2015. It is selected as one of the ten finalists in the NIST Lightweight Cryptography competition.
Solane El Hirch +3 more
doaj +1 more source

