A survey on biometric cryptosystems and their applications
S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …
protocols and a unique identification ecosystem for various applications. Over the years …
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip
Increased complexity in modern embedded systems has presented various important
challenges with regard to side-channel attacks. In particular, it is common to deploy SoC …
challenges with regard to side-channel attacks. In particular, it is common to deploy SoC …
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …
interest in the past two decades. While security-related issues have been well studied, how …
Understanding security failures of multi-factor authentication schemes for multi-server environments
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
how to achieve better security. Dozens of multi-factor authentication schemes for multi …
Rosita: Towards automatic elimination of power-analysis leakage in ciphers
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …
serious security threat. While many ciphers' implementations employ masking techniques to …
[PDF][PDF] Secure Information Flow and Pointer Confinement in a Java-like Language.
A Banerjee, DA Naumann - CSFW, 2002 - Citeseer
We consider a sequential object-oriented language with pointers and mutable state, private
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …
[PDF][PDF] Gone in 360 seconds: Hijacking with Hitag2
An electronic vehicle immobilizer is an anti-theft device which prevents the engine of the
vehicle from starting unless the corresponding transponder is present. Such a transponder is …
vehicle from starting unless the corresponding transponder is present. Such a transponder is …
Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series
A Moradi, T Schneider - … workshop on constructive side-channel analysis …, 2016 - Springer
Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs
can be broken by side-channel analysis. Presented at CT-RSA 2012, using graphics …
can be broken by side-channel analysis. Presented at CT-RSA 2012, using graphics …
Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …
time data access in wireless sensor networks. On the one hand, such real-time applications …
Leaky noise: New side-channel attack vectors in mixed-signal IoT devices
Microcontrollers and SoC devices have widely been used in Internet of Things applications.
This also brings the question whether they lead to new security threats unseen in traditional …
This also brings the question whether they lead to new security threats unseen in traditional …