MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more schemes that provide Authenticated …
Traditional cryptographic standards are designed with a desktop and server environment in mind, so, with the relatively recent proliferation of small, resource constrained devices in the …
In Table 2, we show analysis results on Ascon that further weaken the algorithm outside of its specification and security claim by repeating the nonce, using more than 264 blocks of …