Evaluating the performance of ascon lightweight authenticated encryption for ai-enabled iot devices
Internet of Things (IoTs) have proliferated our daily lives with numerous applications ranging
from smart appliances to smart cities. IoT devices exchange sensor data by connecting to an …
from smart appliances to smart cities. IoT devices exchange sensor data by connecting to an …
Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-
security attacks. One of the key security aspects is data integrity, which can be protected by …
security attacks. One of the key security aspects is data integrity, which can be protected by …
Scalable and efficient hardware architectures for authenticated encryption in IoT applications
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
Area–time efficient implementation of nist lightweight hash functions targeting IoT applications
To mitigate cybersecurity breaches, secure communication is crucial for the Internet of
Things (IoT) environment. Data integrity is one of the most significant characteristics of …
Things (IoT) environment. Data integrity is one of the most significant characteristics of …
Quantum circuit implementations of lightweight authenticated encryption ASCON
Y Zheng, Q Luo, Q Li, Y Lv - The Journal of Supercomputing, 2024 - Springer
In this paper, we discuss the quantum circuit implementations of the lightweight
authenticated encryption algorithm ASCON by using the NOT gates, CNOT gates, Toffoli …
authenticated encryption algorithm ASCON by using the NOT gates, CNOT gates, Toffoli …
S-box Security Analysis of NIST Lightweight Cryptography Candidates: A Critical Empirical Study
In the resource-constrained world of the digital landscape, lightweight cryptography plays a
critical role in safeguarding information and ensuring the security of various systems …
critical role in safeguarding information and ensuring the security of various systems …
Chosen-plaintext attack on energy-efficient hardware implementation of GIFT-COFB
Electronic devices are connected now more than ever with the prevalence of the Internet of
Things. The ever-increasing communication between these lightweight devices presses for …
Things. The ever-increasing communication between these lightweight devices presses for …
Pro-gage: A high performance compact gage hash function processor for small space technology
There is a growing demand for small devices for aerospace and near-orbit applications such
as CubeSats, airships, and others, which demand comprehensive functionality …
as CubeSats, airships, and others, which demand comprehensive functionality …
Reducing the cost of machine learning differential attacks using bit selection and a partial ML-distinguisher
In a differential cryptanalysis attack, the attacker tries to observe a block cipher's behavior
under an input difference: if the system's resulting output differences show any non-random …
under an input difference: if the system's resulting output differences show any non-random …
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
There are three main approaches related to cryptanalysis of Authenticated Encryption with
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …
Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery …