Evaluating the performance of ascon lightweight authenticated encryption for ai-enabled iot devices

S Khan, WK Lee, SO Hwang - 2022 TRON Symposium …, 2022 - ieeexplore.ieee.org
Internet of Things (IoTs) have proliferated our daily lives with numerous applications ranging
from smart appliances to smart cities. IoT devices exchange sensor data by connecting to an …

Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications

WK Lee, K Jang, G Song, H Kim, SO Hwang… - IEEE Access, 2022 - ieeexplore.ieee.org
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …

Scalable and efficient hardware architectures for authenticated encryption in IoT applications

S Khan, WK Lee, SO Hwang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …

Area–time efficient implementation of nist lightweight hash functions targeting IoT applications

S Khan, WK Lee, A Karmakar, JMB Mera… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
To mitigate cybersecurity breaches, secure communication is crucial for the Internet of
Things (IoT) environment. Data integrity is one of the most significant characteristics of …

Quantum circuit implementations of lightweight authenticated encryption ASCON

Y Zheng, Q Luo, Q Li, Y Lv - The Journal of Supercomputing, 2024 - Springer
In this paper, we discuss the quantum circuit implementations of the lightweight
authenticated encryption algorithm ASCON by using the NOT gates, CNOT gates, Toffoli …

S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study

M Naseer, S Tariq, N Riaz, N Ahmed… - arxiv preprint arxiv …, 2024 - arxiv.org
In the resource-constrained world of the digital landscape, lightweight cryptography plays a
critical role in safeguarding information and ensuring the security of various systems …

Chosen-plaintext attack on energy-efficient hardware implementation of GIFT-COFB

Y Zhong, U Guin - … on Hardware Oriented Security and Trust …, 2022 - ieeexplore.ieee.org
Electronic devices are connected now more than ever with the prevalence of the Internet of
Things. The ever-increasing communication between these lightweight devices presses for …

Pro-gage: A high performance compact gage hash function processor for small space technology

M El-Hadedy, M Margala, S Mosanu… - 2021 IEEE Space …, 2021 - ieeexplore.ieee.org
There is a growing demand for small devices for aerospace and near-orbit applications such
as CubeSats, airships, and others, which demand comprehensive functionality …

Reducing the cost of machine learning differential attacks using bit selection and a partial ML-distinguisher

A Ebrahimi, F Regazzoni, P Palmieri - International Symposium on …, 2022 - Springer
In a differential cryptanalysis attack, the attacker tries to observe a block cipher's behavior
under an input difference: if the system's resulting output differences show any non-random …

Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM

SE Ulusoy, O Kara, MÖ Efe - Journal of Information Security and …, 2022 - Elsevier
There are three main approaches related to cryptanalysis of Authenticated Encryption with
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …