搜索结果: 1-5 共查到“Ascon”相关记录5条 . 查询时间(0.046 秒)
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cu...
Truncated, Impossible, and Improbable Differential Analysis of Ascon
Ascon Truncated Differential Impossible Differential
2016/5/23
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition
for Authenticated Encryption: Security, Applicability, and Robustness. So far, succe...
We present a detailed security analysis of the CAESAR candidate
Ascon. Amongst others, cube-like, differential and linear cryptanalysis
are used to evaluate the security of Ascon. Our results are
p...
Suit up! Made-to-Measure Hardware Implementations of Ascon
Authenticated encryption CAESAR competition hardware design
2016/1/5
Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. In this paper...