Results 51 to 60 of about 5,570 (256)
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
The Internet of Things is changing all sectors such as manufacturing, agriculture, city infrastructure, and the automotive industry. All these applications ask for secure processors that can be embedded in the IoT devices. Furthermore, these devices are restricted in terms of computing capabilities, memory, and power consumption.
Wajih El Hadj Youssef +5 more
wiley +1 more source
Nonlinearity Improvement for Ascon Substitution Box [PDF]
Mohamed H. Bakr, Noha Korany
openalex +2 more sources
Electromagnetic Fault Injection Attack on ASCON Using ChipShouter
Varun Narayanan, Sriram Sankaran
openalex +3 more sources
Consenso colombiano de prevención de enfermedad renal crónica en los niños con bajo peso al nacer
Contexto: el bajo peso al nacer (BPN) es un factor de riesgo para el desarrollo de enfermedad renal crónica (ERC), aumentando su probabilidad de ocurrencia en la vida adulta hasta en 70% y duplicando el riesgo de ERC en edad pediátrica.
Juan Guillermo Cárdenas Aguilera +6 more
doaj +1 more source
ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and ...
Jing WANG +4 more
doaj +2 more sources
ABSTRACT Given the growing concern over the environmental impacts of industrial effluents, particularly from tanneries, assessing the ecotoxicological risks associated with these effluents, even after remediation treatments, is crucial. Therefore, we aimed to evaluate the potential effects of exposure to raw and treated tannery effluents with ...
Alex Rodrigues Gomes +9 more
wiley +1 more source
Evaluating Ascon Hardware on 7-Series FPGA Devices
The applications regarding the Internet of Things (IoT) demand lightweight and robust cryptographic solutions to ensure authenticated encryption with associated data (AEAD). Also, the lightweight cryptographic solutions that provide data confidentiality,
Adel R. Alharbi +5 more
doaj +1 more source
The Internet of Things (IoT) has rapidly grown in recent years, making it an integral part of many areas of our lives. Many IoT networks require high data throughput and low latency, allowing for real-time communication and data transmission, enabling ...
Sy-Nam Tran +2 more
doaj +1 more source
Blockweave: An Arweave‐Based Decentralized Storage Solution to Tackle the Blockchain Trilemma
Leveraging Arweave's blockweave and Proof‐of‐Access consensus, this framework reduces on‐chain metadata to 48 bytes, enabling throughput up to 7200 TPS, 99%$$ 99\% $$ storage savings, and robust security (Q(0.4)=0.82)$$ \left(\mathrm{Q}(0.4)=0.82\right) $$ while achieving Tier‐S decentralization on $300 mining nodes.
Saha Reno, Koushik Roy, Tamanna Tabassum
wiley +1 more source
Preliminary study on comparative morphometry of Cynothrissa mento (Regan, 1917) from Ologe, Badagry and Epe Lagoons, Lagos, Nigeria [PDF]
The morphometric characters of Cynothrissa mento from three major Lagoons (Ologe, Badagry and Epe) in Lagos, Nigeria were compared to assess the possibility of this fish species from the three Lagoons belonging to the same sub-population.
Ayorinde, O.A. +5 more
core

