Detection of fault data injection attack on uav using adaptive neural network

A Abbaspour, KK Yen, S Noei, A Sargolzaei - Procedia computer science, 2016 - Elsevier
A resilient and secure control system should be designed to be as safe and robust as
possible in face of different types of attacks such as fault data injection (FDI) attacks; thus …

Fault attacks on access control in processors: Threat, formal analysis and microarchitectural mitigation

ALD Antón, J Müller, MR Fadiheh, D Stoffel… - IEEE Access, 2023 - ieeexplore.ieee.org
Process isolation is a key component of the security architecture in any hardware/software
system. However, even when implemented correctly and comprehensively at the software …

Securing web documents by using piggybacked framework based on Newton's forward interpolation method

J Arora, KR Ramkumar, R Sathiyaraj… - Journal of Information …, 2023 - Elsevier
The modern telecommunication system that transfers data over the web requires a secure
channel so that integrity, authentication, and confidentiality of data are ensured. To achieve …

Lightweight Side Channel Resistance: Threshold Implementations of Simon

A Shahverdi, M Taha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As networking has become major innovation driver for the Internet of Things as well as
Networks on Chips, the need for effective cryptography in hardware is on a steep rise. Both …

[HTML][HTML] Some Properties of the Computation of the Modular Inverse with Applications in Cryptography

M Bufalo, D Bufalo, G Orlando - Computation, 2023 - mdpi.com
In the field of cryptography, many algorithms rely on the computation of modular
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …

[HTML][HTML] Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds

R Almukhlifi, PL Vora - Cryptography, 2023 - mdpi.com
The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which
combines the design features of the NSA-designed block ciphers Simon and Speck …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

Certificateless multi-source elliptic curve ring signcryption for cloud computing

H Yu, J Liu, Z Wang - Journal of Information Security and Applications, 2023 - Elsevier
Network coding can encode and forward the received data packets to save the network
resources and improve the bandwidth utilization in cloud computing environment. To resist …

[HTML][HTML] A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip

C Xu, H Yu, W Xi, J Zhu, C Chen, X Jiang - Electronics, 2023 - mdpi.com
Polynomial multiplication is the most computationally expensive part of the lattice-based
cryptography algorithm. However, the existing acceleration schemes have problems, such …

A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks

T Yang, C Murguia, D Nešić, C Lv - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of
vehicles on the highway to form in closely-coupled automated platoons to increase highway …