Lightweight Cryptography
This paper explores the cryptanalysis of the ASCON algorithm, a lightweight cryptographic method designed for applications like the Internet of Things (IoT). We utilize deep learning techniques to identify potential vulnerabilities within ASCON's structure. First, we provide an overview of how ASCON operates, including key generation and encryption processes.
- Categories:

The detailed linear trails of CHAM are given.
In each file, you can find a linear trail and the correlation of it.
In a file named "LT_CHAM_64_xR_y.txt", an x-round linear trail with correlation 2^{-y} of CHAM with a block size of 64 bits is given.
In total, there are 44 linear trails of CHAM with a block size of 64 bits.
In a file named "LT_CHAM_128_xR_y.txt", an x-round linear trail with correlation 2^{-y} of CHAM with a block size of 128 bits is given.
In total, there are 54 linear trails of CHAM with a block size of 128 bits.
- Categories: