Filters








54 Hits in 6.8 sec

Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults [chapter]

F. Bao, R. H. Deng, Y. Han, A. Jeng, A. D. Narasimhalu, T. Ngair
<span title="">1998</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper we present a method of attacking public-key cryptosystems (PKCs) on tamper resistant devices. The attack makes use of transient faults and seems applicable to many types of PKCs.  ...  In particular, we show how to attack the RSA, the E1Gamal signature scheme, the Schnorr signature scheme, and the DSA. We also present some possible methods to counter the attack.  ...  Acknowledgments The work reported in this paper was motivated by the Bellcore Press Release [4] and further motivated by Biham and Shamir's research announcement [5] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028164">doi:10.1007/bfb0028164</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yimqfb7iqbdindbizdnlly5jnu">fatcat:yimqfb7iqbdindbizdnlly5jnu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200319075623/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=4725&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/f3/8af3ccc3a53e2bedf1cde13de7e5c8839cb1ee73.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028164"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Page 471 of IEEE Transactions on Computers Vol. 52, Issue 4 [page]

<span title="">2003</span> <i title="Institute of Electrical and Electronics Engineers Inc. IEEE"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_ieee-transactions-on-computers" style="color: black;">IEEE Transactions on Computers </a> </i> &nbsp;
Ngair, “Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults,” Pre-proc. 1997 Security Protocols Workshop, 1997 [8] Y. Zheng and T.  ...  Deng, “RSA-Type Signatures in the Presence of Transient Faults,” Cryptography and Coding, pp. 155-160, Springer-Verlag, 1997 D.P.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_ieee-transactions-on-computers_2003-04_52_4/page/471" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_ieee-transactions-on-computers_2003-04_52_4/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

RSA speedup with chinese remainder theorem immune against hardware fault cryptanalysis

Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
<span title="">2003</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5jlmyrayyrdazh5awdlsoec77q" style="color: black;">IEEE transactions on computers</a> </i> &nbsp;
Ngair, “Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults,” Pre-proc. 1997 Security Protocols Workshop, 1997 [8] Y. Zheng and T.  ...  Based on a set of incorrect responses or outputs from the device, due to the presence of faults, the adversary can then extract the secrets embedded in the tamper-proof device kinds of very These attacks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2003.1190587">doi:10.1109/tc.2003.1190587</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sb7s2lz3i5bc3bgw2cza3ummye">fatcat:sb7s2lz3i5bc3bgw2cza3ummye</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_ieee-transactions-on-computers_2003-04_52_4/page/461" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_ieee-transactions-on-computers_2003-04_52_4/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2003.1190587"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

On the Importance of Checking Cryptographic Protocols for Faults [chapter]

Dan Boneh, Richard A. DeMillo, Richard J. Lipton
<span title="">1997</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures.  ...  We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.  ...  Venkatesan for his help in working out some preliminary details of Differential Fault Analysis of DES in parallel to Biham and Shamir.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-69053-0_4">doi:10.1007/3-540-69053-0_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6uwbi5j5hnh27cby3o7l7y5x2i">fatcat:6uwbi5j5hnh27cby3o7l7y5x2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728083814/https://link.springer.com/content/pdf/10.1007%2F3-540-69053-0_4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/ce/e2ceac65a53955893ca3152b992e65489e16e08a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-69053-0_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Fault Attacks on Secure Embedded Software: Threats, Design and Evaluation [article]

Bilgiday Yuce, Patrick Schaumont, Marc Witteman
<span title="2020-03-23">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This article is a review on hardware-based fault attacks on software, with emphasis on the context of embedded systems.  ...  For example, the assumption that an adversary has to be close to the physical execution of software, in order to inject an exploitable fault into hardware, has repeatedly been shown to be incorrect.  ...  During this work, the first author was supported in part through the National Science Foundation Grant 1441710 and 1314598, and in part through the Semiconductor Research Corporation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2003.10513v1">arXiv:2003.10513v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/paebhdl4cjhfvp7o5skttooyym">fatcat:paebhdl4cjhfvp7o5skttooyym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200326054612/https://arxiv.org/pdf/2003.10513v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2003.10513v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

On security issues in embedded systems: challenges and solutions

Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache
<span title="">2008</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h3yw63gqmva2zbqlgtsrgrnh54" style="color: black;">International Journal of Information and Computer Security</a> </i> &nbsp;
This paper provides a unified view on security in embedded systems, by introducing first the implied design and architectural challenges.  ...  Ensuring security in embedded systems translates into several design challenges, imposed by the unique features of these systems.  ...  of appropriate tamper resistance techniques that strengthen the device against software and hardware attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijics.2008.018515">doi:10.1504/ijics.2008.018515</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/up7vrjklrneahhxxzibcspiae4">fatcat:up7vrjklrneahhxxzibcspiae4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110523195223/http://hal.archives-ouvertes.fr/docs/00/38/99/76/PDF/E2S.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/f0/69f031e05cdda7014c07f721523483bc7b665c99.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijics.2008.018515"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey on Fault Attacks [chapter]

Christophe Giraud, Hugues Thiebeauld
<span title="">2004</span> <i title="Springer US"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/razadluzejfntbhhcw5smbd2oy" style="color: black;">IFIP International Federation for Information Processing</a> </i> &nbsp;
After studying several ways of inducing faults' we describe attacks on the most popular cryptosystems and we discuss the problem of induced perturbations in the smart card environment.  ...  Fault attacks described in cryptographic papers mostly apply to cryptographic algorithms' yet such attacks may have an impact on the whole system in a smart card.  ...  Only two papers dealing with elliptic curve scalar multiplication in the presence of faults have been published.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/1-4020-8147-2_11">doi:10.1007/1-4020-8147-2_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eq3b2r76wjdc7exm4ikxftbgea">fatcat:eq3b2r76wjdc7exm4ikxftbgea</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503074716/https://link.springer.com/content/pdf/10.1007%2F1-4020-8147-2_11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/2d/052dbd478fe6e6861833590fa3716c99f041e076.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/1-4020-8147-2_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Embedded Systems Security [article]

Muhammad Farooq-i-Azam, Muhammad Naeem Ayyaz
<span title="2016-10-03">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area  ...  The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks.  ...  The hardware attacks can be mounted at any of the layers of abstraction involved in the fabrication of the device with varying degrees of success.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1610.00632v1">arXiv:1610.00632v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qovwb2h4ofhhppt3u5nhnyqoxa">fatcat:qovwb2h4ofhhppt3u5nhnyqoxa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200828095848/https://arxiv.org/ftp/arxiv/papers/1610/1610.00632.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/d8/25d8f017f015c7add30651ddecae1c9f548e1461.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1610.00632v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Fault Injection Attacks on Cryptographic Devices: Theory, Practice, and Countermeasures

Alessandro Barenghi, Luca Breveglieri, Israel Koren, David Naccache
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
The paper provides a comprehensive description of these attacks on cryptographic devices and the countermeasures that have been developed against them.  ...  Implementations of cryptographic algorithms continue to proliferate in consumer products due to the increasing demand for secure transmission of confidential information.  ...  This requires encasing the device in a tamper-proof box and including sensors to detect any attempted tampering with the device.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2012.2188769">doi:10.1109/jproc.2012.2188769</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d6hv5jgywjfirio677djrrlycq">fatcat:d6hv5jgywjfirio677djrrlycq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812065552/http://euler.ecs.umass.edu/research/bbkn-IEEEP-2012.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/05/29050fd746a23979437c9f358ba143377a3d5e39.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2012.2188769"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Security Protocols in a Nutshell [article]

Mohsen Toorani
<span title="2016-06-02">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Furthermore, a survey on computational security models for authenticated key exchange (AKE) and password-authenticated key exchange (PAKE) protocols, as the most important and well-studied type of security  ...  It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of protocols.  ...  Acknowledgment The author would like to thank Øyvind Ytrehus for helpful comments and discussions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1605.09771v2">arXiv:1605.09771v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mkbc3in6tvdo7madnvqaxogbfq">fatcat:mkbc3in6tvdo7madnvqaxogbfq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930052755/https://arxiv.org/pdf/1605.09771v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/c4/7bc4ec26ed0108feca5e5ce9bc07f74ea1b170fa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1605.09771v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems

Mehran Mozaffari-Kermani, Kai Tian, Reza Azarderakhsh, Siavash Bayat-Sarmadi
<span title="">2014</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fcpafl32h5cn5cfpmldtiodhge" style="color: black;">IEEE Embedded Systems Letters</a> </i> &nbsp;
In this thesis, considering false-alarm resistivity, error detection schemes for the lightweight block ciphers are proposed with the case study of XTEA (eXtended TEA).  ...  To the best of the author's knowledge, there has been no error detection scheme presented in the literature for the XTEA to date.  ...  Fault attack is a variant of side-channel analysis which is active, where an adversary has to tamper with an attacked device in order to create faults, thereby opening the desired side-channel.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/les.2014.2365099">doi:10.1109/les.2014.2365099</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bmpoyosicbh67bffjc5d2isrou">fatcat:bmpoyosicbh67bffjc5d2isrou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200322120825/https://scholarworks.rit.edu/cgi/viewcontent.cgi?article=9651&amp;context=theses" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/af/b1afd2ab76ef74dcaadac3faff13249471dcd705.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/les.2014.2365099"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Security in wireless ad-hoc networks – A survey

R. Di Pietro, S. Guarino, N.V. Verde, J. Domingo-Ferrer
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyvgmlsc5a5xi7554ow77exfu" style="color: black;">Computer Communications</a> </i> &nbsp;
In this case, communications rely on the ability 17 of the nodes to form a multi-hop radio network.  ...  Generally speaking, several 18 vulnerabilities can be identified in ad-hoc networks, and at a very abstract level 19 they can be related to one of the following issues: 20 Vulnerability of the channel  ...  Kuhn, Low cost attacks on tamper resistant devices, in: Proceedings of the 5th International Workshop on Security Protocols, Springer-Verlag, London, UK, 1998, pp. 125-136.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.06.003">doi:10.1016/j.comcom.2014.06.003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dxpctx3ta5c6fllp2pxacffl2y">fatcat:dxpctx3ta5c6fllp2pxacffl2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809101253/https://crises-deim.urv.cat/web/docs/publications/journals/831.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/b3/ccb3d11cd1d4ffd52318de9a9b4ede84f11b5d3d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.06.003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Error analysis and detection procedures for a hardware implementation of the advanced encryption standard

G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri
<span title="">2003</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5jlmyrayyrdazh5awdlsoec77q" style="color: black;">IEEE transactions on computers</a> </i> &nbsp;
In this paper, we first describe some studies of the effects that faults may have on a hardware implementation of AES by analyzing the propagation of such faults to the outputs.  ...  It will also protect the encryption/decryption circuitry from an attacker who may maliciously inject faults in order to find the encryption secret key.  ...  Custom devices, in contrast, are less flexible, but are more resistant against tampering or physical alteration than field-programmable ones.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2003.1190590">doi:10.1109/tc.2003.1190590</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xzhagzv4bbbgnennjefj6wls4e">fatcat:xzhagzv4bbbgnennjefj6wls4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829202830/http://euler.ecs.umass.edu/research/bbkmp-IEEETC-2003.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/50/4750830504d3f08d293c55152c4d52519d86a7db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tc.2003.1190590"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Public-Key Infrastructure [chapter]

<span title="2013-03-25">2013</span> <i title="John Wiley &amp; Sons, Ltd"> Wireless Mobile Internet Security </i> &nbsp;
Preface This book contains the proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, which was held on the NTNU campus Gløshaugen in Trondheim, Norway,  ...  The EuroPKI workshop series focuses on all research and practice aspects of public key infrastructures, services and applications, and welcomes original research papers and excellent survey contributions  ...  The second author was previously funded by the Universitary Mission of Tunisia in North America.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7">doi:10.1002/9781118512920.ch7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hocfzfhi4rbuhmssop2hkwbc64">fatcat:hocfzfhi4rbuhmssop2hkwbc64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160919180742/http://orbilu.uni.lu/bitstream/10993/25909/1/bok%253A978-3-540-69485-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/3d/5d3dc8a9addb140613cea039906ebe2fb17f8f57.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions [article]

Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaqu, Abdullah Alourani
<span title="2022-03-21">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The key challenges resulted from the integration of Blockchain with IoV is investigated in several domains such as edge computing, ML, and FL.  ...  In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion  ...  The authors suggest a future work could make use of public key encryption to solve this problem.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.10708v1">arXiv:2203.10708v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sozptzz5l5a27oh5rukujcg32a">fatcat:sozptzz5l5a27oh5rukujcg32a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220323144415/https://arxiv.org/pdf/2203.10708v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/a5/38a552a9ac3477f5efc89c295cc275a95537cec2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2203.10708v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 54 results