Detailed Assessment of Hardware Implementations, Attacks and Countermeasures for the Ascon Authenticated Cipher | Publicación