MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more schemes that provide Authenticated …
Y Zheng, Q Luo, Q Li, Y Lv - The Journal of Supercomputing, 2024 - Springer
In this paper, we discuss the quantum circuit implementations of the lightweight authenticated encryption algorithm ASCON by using the NOT gates, CNOT gates, Toffoli …
H Eom, M Cho, C Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Huang et al. introduced the conditional cube attack at EUROCRYPT 2017, where it was presented as a conditional cube variable with specific key bit conditions that significantly …
F Wiemer, A Zeh - Proceedings of the 7th ACM Computer Science in …, 2023 - dl.acm.org
Enabling secure communication to and from endpoint-ECUs in automotive E/E architectures is crucial, as eg shown by recent attacks such as CAN injection. Cost-efficient and resource …
The rapid proliferation of digital devices and connectivity has seen an unprecedented rise in the threats of cyber-attacks, making cybersecurity a high research priority worldwide. Among …
The growing Internetof Things (loT) technology has made nearly all possible devices to interconnect seamlessly, such inter-network would raise the consideration for security in …
The security of resource-constrained devices is critical in the IoT field, given that everything is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
This report outlines the implementation and subsequent optimization of the ASCON-80pq cryptographic algorithm on the ChipWhisperer Nano platform, with a focus on enhancing …