Low-power technologies for wearable telecare and telehealth systems: A review
Wearable telecare and telehealth systems are those which can be worn on the human body
and continuously monitor a user's vital status. Even though these systems have already …
and continuously monitor a user's vital status. Even though these systems have already …
Combining Leakage-Resilient PRFs and Shuffling: Towards Bounded Security for Small Embedded Devices
Combining countermeasures is usually assumed to be the best way to protect embedded
devices against side-channel attacks. These combinations are at least expected to increase …
devices against side-channel attacks. These combinations are at least expected to increase …
Side-channel security analysis of ultra-low-power FRAM-based MCUs
A Moradi, G Hinterwälder - … Side-Channel Analysis and Secure Design …, 2015 - Springer
By shrinking the technology and reducing the energy requirements of integrated circuits,
producing ultra-low-power devices has practically become possible. Texas Instruments as a …
producing ultra-low-power devices has practically become possible. Texas Instruments as a …
Combining leakage-resilient PRFs and shuffling
L Gaspar - Springer, 2015 - Springer
Combining countermeasures is usually assumed to be the best way to protect embedded
devices against side-channel attacks. These combinations are at least expected to increase …
devices against side-channel attacks. These combinations are at least expected to increase …
[PDF][PDF] Towards side-channel secure block ciphers.
V Grosso - 2015 - dial.uclouvain.be
Since the late 90's side-channel attacks have been a threat for cryptographic
implementations. They use observations of physical features of a device while it computes …
implementations. They use observations of physical features of a device while it computes …
[PDF][PDF] Towards fair evaluation and intellectual property protection of cryptographic implementations.
S Kerckhof - 2014 - dial.uclouvain.be
With the emergence of the internet of things, the research surrounding the design of
cryptographic algorithms suited for constrained environments has rapidly gained ground …
cryptographic algorithms suited for constrained environments has rapidly gained ground …