A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

J Longo, E De Mulder, D Page, M Tunstall - Cryptographic Hardware and …, 2015 - Springer
Increased complexity in modern embedded systems has presented various important
challenges with regard to side-channel attacks. In particular, it is common to deploy SoC …

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

D Wang, N Wang, P Wang, S Qing - Information Sciences, 2015 - Elsevier
Due to its simplicity, portability and robustness, two-factor authentication has received much
interest in the past two decades. While security-related issues have been well studied, how …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

Rosita: Towards automatic elimination of power-analysis leakage in ciphers

MA Shelton, N Samwel, L Batina, F Regazzoni… - arXiv preprint arXiv …, 2019 - arxiv.org
Since their introduction over two decades ago, side-channel attacks have presented a
serious security threat. While many ciphers' implementations employ masking techniques to …

[PDF][PDF] Secure Information Flow and Pointer Confinement in a Java-like Language.

A Banerjee, DA Naumann - CSFW, 2002 - Citeseer
We consider a sequential object-oriented language with pointers and mutable state, private
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …

[PDF][PDF] Gone in 360 seconds: Hijacking with Hitag2

R Verdult, FD Garcia, J Balasch - 21st USENIX Security Symposium …, 2012 - usenix.org
An electronic vehicle immobilizer is an anti-theft device which prevents the engine of the
vehicle from starting unless the corresponding transponder is present. Such a transponder is …

Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series

A Moradi, T Schneider - … workshop on constructive side-channel analysis …, 2016 - Springer
Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs
can be broken by side-channel analysis. Presented at CT-RSA 2012, using graphics …

Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs

D Wang, P Wang, C Wang - ACM Transactions on Cyber-Physical …, 2020 - dl.acm.org
It is challenging to design a secure and efficient multi-factor authentication scheme for real-
time data access in wireless sensor networks. On the one hand, such real-time applications …

Leaky noise: New side-channel attack vectors in mixed-signal IoT devices

DRE Gnad, J Krautter, MB Tahoori - IACR Transactions on …, 2019 - tches.iacr.org
Microcontrollers and SoC devices have widely been used in Internet of Things applications.
This also brings the question whether they lead to new security threats unseen in traditional …