A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
FourQ on embedded devices with strong countermeasures against side-channel attacks
2018
IEEE Transactions on Dependable and Secure Computing
using FourQ and incorporating strong countermeasures to thwart a wide variety of side-channel attacks. ...
Second, we engineer a set of side-channel countermeasures taking advantage of FourQ's rich arithmetic and propose a secure implementation that offers protection against a wide range of sophisticated side-channel ...
We would like to thank Craig Costello for helping in the design of the scalar randomization countermeasure, and Diego F. Aranha, Pedro R. N. ...
doi:10.1109/tdsc.2018.2799844
fatcat:y3cpp7k2hfcvhbxgaksqeuc6jm
2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17
2021
IEEE Transactions on Dependable and Secure Computing
Zhu, L., +, TDSC July-Aug. 2020 703-715
FourQ on Embedded Devices with Strong Countermeasures Against
Side-Channel Attacks. ...
Zhu, L., +, TDSC July-Aug. 2020 703-715
Embedded systems
FourQ on Embedded Devices with Strong Countermeasures Against
Side-Channel Attacks. ...
doi:10.1109/tdsc.2020.3038615
fatcat:vzqqhgq3rrda3atviwpz65ch5e
Four $$\mathbb {Q}$$ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields
[chapter]
2016
Lecture Notes in Computer Science
All the presented implementations exhibit regular, constant-time execution, protecting against timing and simple side-channel attacks. ...
factor-2.5 and 2 speedups in comparison with the corresponding variants of the fastest Curve25519 implementation on the same device. ...
Future work involves the inclusion of strong countermeasures against such attacks. ...
doi:10.1007/978-3-662-53140-2_25
fatcat:lnlme2ralvauljvmbyf4svpcsy
Curve25519 for the Cortex-M4 and Beyond
[chapter]
2019
Lecture Notes in Computer Science
These devices are located towards the lower to mid-end spectrum of ARM cores, and are typically used on embedded devices. ...
devices. ...
Side-channel security is achieved using isochronous (constant time) code execution and linear table scan countermeasures. ...
doi:10.1007/978-3-030-25283-0_6
fatcat:sbfbbkxs2jey5j6l7g6lrznzyi
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
2021
IEEE Access
According to the authors, a side-channel analysis should be used to detect deadly Trojans. ...
Moreover, each MEC device can communicate with other MEC devices and the central server through a faster and secure channel. ...
doi:10.1109/access.2021.3072030
fatcat:7yqywbuv6rbfvjjgzqtjdanrly
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
2019
Transactions on Cryptographic Hardware and Embedded Systems
The larger threat of physical attacks makes it important to use memory-hard password hashing. ...
Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting. ...
We also acknowledge inspiring discussions with Daniel Rausch, Ralf Küsters, Denis Kügler, Marc Fischlin, Mike Hamburg and Peter Schwabe. ...
doi:10.13154/tches.v2019.i2.1-48
dblp:journals/tches/HaaseL19
fatcat:n7i2bbjhnbdb5dk7ixw3dbftcq
SDN Security Review: Threat Taxonomy, Implications, and Open Challenges
2022
IEEE Access
A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them. ...
On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration. ...
Based on the assessment, the results concluded that relying on userspace increases the latency with fewer samples than the kernel space. For the examination of LFA in SDN, Khan et al. ...
doi:10.1109/access.2022.3168972
fatcat:wdjp2kzohjbhvefsjebln2buly
A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles
[article]
2022
arXiv
pre-print
against attacks, and safety standards in CAVs. ...
There are some surveys with a limited discussion on Attacks Detection and Prevention Systems (ADPS), but such surveys provide only partial coverage of different types of ADPS for CAVs. ...
Moreover, the adversary can send the same CAN messages with high frequency, overwhelming the network resources to launch a CAN bus-off attack. 7) Side-channel: This attack is performed by analyzing the ...
arXiv:2203.14965v1
fatcat:4orttcmbjfei5dbhsjnaovmm7a
TRICKS -time TRIggered Covert Key Sharing for Controller Area Networks
2019
IEEE Access
We also present the experimental results on modern automotive-grade controllers to prove the performance of our solution. ...
There are dozens of proposals for securing the controller area network (CAN); however, only a few of them are concerned on how to share secret keys between CAN nodes. ...
The CAN communication on the embedded platforms side is assured through the on-chip MultiCAN+ module. ...
doi:10.1109/access.2019.2931247
fatcat:ycs3lfa3trftdhgw4xvadihleq