Detection of fault data injection attack on uav using adaptive neural network
A resilient and secure control system should be designed to be as safe and robust as
possible in face of different types of attacks such as fault data injection (FDI) attacks; thus …
possible in face of different types of attacks such as fault data injection (FDI) attacks; thus …
Fault attacks on access control in processors: Threat, formal analysis and microarchitectural mitigation
Process isolation is a key component of the security architecture in any hardware/software
system. However, even when implemented correctly and comprehensively at the software …
system. However, even when implemented correctly and comprehensively at the software …
Securing web documents by using piggybacked framework based on Newton's forward interpolation method
The modern telecommunication system that transfers data over the web requires a secure
channel so that integrity, authentication, and confidentiality of data are ensured. To achieve …
channel so that integrity, authentication, and confidentiality of data are ensured. To achieve …
Lightweight Side Channel Resistance: Threshold Implementations of Simon
A Shahverdi, M Taha… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
As networking has become major innovation driver for the Internet of Things as well as
Networks on Chips, the need for effective cryptography in hardware is on a steep rise. Both …
Networks on Chips, the need for effective cryptography in hardware is on a steep rise. Both …
[HTML][HTML] Some Properties of the Computation of the Modular Inverse with Applications in Cryptography
M Bufalo, D Bufalo, G Orlando - Computation, 2023 - mdpi.com
In the field of cryptography, many algorithms rely on the computation of modular
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …
multiplicative inverses to ensure the security of their systems. In this study, we build upon our …
[HTML][HTML] Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds
R Almukhlifi, PL Vora - Cryptography, 2023 - mdpi.com
The Simeck family of lightweight block ciphers was proposed by Yang et al. in 2015, which
combines the design features of the NSA-designed block ciphers Simon and Speck …
combines the design features of the NSA-designed block ciphers Simon and Speck …
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
Certificateless multi-source elliptic curve ring signcryption for cloud computing
H Yu, J Liu, Z Wang - Journal of Information Security and Applications, 2023 - Elsevier
Network coding can encode and forward the received data packets to save the network
resources and improve the bandwidth utilization in cloud computing environment. To resist …
resources and improve the bandwidth utilization in cloud computing environment. To resist …
[HTML][HTML] A Polynomial Multiplication Accelerator for Faster Lattice Cipher Algorithm in Security Chip
C Xu, H Yu, W Xi, J Zhu, C Chen, X Jiang - Electronics, 2023 - mdpi.com
Polynomial multiplication is the most computationally expensive part of the lattice-based
cryptography algorithm. However, the existing acceleration schemes have problems, such …
cryptography algorithm. However, the existing acceleration schemes have problems, such …
A Robust CACC Scheme Against Cyberattacks Via Multiple Vehicle-to-Vehicle Networks
Cooperative Adaptive Cruise Control (CACC) is a vehicular technology that allows groups of
vehicles on the highway to form in closely-coupled automated platoons to increase highway …
vehicles on the highway to form in closely-coupled automated platoons to increase highway …