Attacks on cryptosystems implemented via VLSI: A review
MM Sravani, SA Durai - Journal of Information Security and Applications, 2021 - Elsevier
Serious threats to the VLSI crypto devices are posed by the Side Channel Attack (SCA) that
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
utilizes the devices' SCI (Side Channel Information) to break the entire cryptographic …
Survey on power analysis attacks and its impact on intelligent sensor networks
SR Shanmugham… - IET Wireless Sensor …, 2018 - Wiley Online Library
Smart or intelligent sensors are integrated physical units embedded with sensors,
processors, and communication devices. The sensors also known as edge nodes form the …
processors, and communication devices. The sensors also known as edge nodes form the …
Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures
In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV)
security by incorporating the security vulnerabilities and countermeasures of the Vehicular …
security by incorporating the security vulnerabilities and countermeasures of the Vehicular …
Host-to-host TCP/IP connection over serial ports using visible light communication
H Yuksel, Ö Altunay - Physical Communication, 2020 - Elsevier
As the radio spectrum becomes increasingly crowded, the superior spectral capacity in the
visible light range becomes increasingly attractive. Visible light communication (VLC) …
visible light range becomes increasingly attractive. Visible light communication (VLC) …
Security Attack Detection Method Combining Side Channel with Fault Injection
W Shen, L Cui, G Shen, X Zhang - … International Conference on …, 2023 - ieeexplore.ieee.org
Thereare still many problems in the actual deployment of both masking technology and out-
of-order technology. In this paper, the typical SCA (Side channel attack) technology is …
of-order technology. In this paper, the typical SCA (Side channel attack) technology is …
Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies
S Beck, M Raavi, C Dale, K Weishalla… - … Conference on Electro …, 2024 - ieeexplore.ieee.org
Short-range wireless communications have become a part of everyday human life and
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …
A low-complexity security technique in physical layer for fixed LiFi communication systems
I Romdhane, H Yuksel - Journal of Information Security and Applications, 2020 - Elsevier
This research paper introduces a novel low-complexity physical layer security technique
based on an encryption model for fixed LiFi communication systems. This encryption model …
based on an encryption model for fixed LiFi communication systems. This encryption model …
Model for capturing noise free traces for Side Channel Power Cryptanalysis based on SAKURA-G FPGA and Case study of AES
V Nalla, D Narendar… - … Conference on Recent …, 2022 - ieeexplore.ieee.org
Side Channel Cryptanalysis is one of the minimum requirments for design of new
cryptosystem. The main research is focused on power attack of Side Channel Cryptanalysis …
cryptosystem. The main research is focused on power attack of Side Channel Cryptanalysis …
A new approach in cyber security of industrial control systems: Li-Fi
Industrial Control Systems used in the control of critical infrastructures, especially in smart
grids, have made a rapid transition from an isolated network architecture to wired and …
grids, have made a rapid transition from an isolated network architecture to wired and …
[PDF][PDF] A new approach in cyber security of industrial control systems: Li-Fi
A new approach in cyber security of industrial control systems: Li-Fi Endüstriyel kontrol
sistemlerinin siber güvenli inde yen Page 1 POLİTEKNİK DERGİSİ JOURNAL of …
sistemlerinin siber güvenli inde yen Page 1 POLİTEKNİK DERGİSİ JOURNAL of …