Filters








9 Hits in 3.4 sec

FourQ on embedded devices with strong countermeasures against side-channel attacks

Zhe Liu, Patrick Longa, Geovandro Pereira, Oscar Reparaz, Hwajeong Seo
2018 IEEE Transactions on Dependable and Secure Computing  
using FourQ and incorporating strong countermeasures to thwart a wide variety of side-channel attacks.  ...  Second, we engineer a set of side-channel countermeasures taking advantage of FourQ's rich arithmetic and propose a secure implementation that offers protection against a wide range of sophisticated side-channel  ...  We would like to thank Craig Costello for helping in the design of the scalar randomization countermeasure, and Diego F. Aranha, Pedro R. N.  ... 
doi:10.1109/tdsc.2018.2799844 fatcat:y3cpp7k2hfcvhbxgaksqeuc6jm

2020 Index IEEE Transactions on Dependable and Secure Computing Vol. 17

2021 IEEE Transactions on Dependable and Secure Computing  
Zhu, L., +, TDSC July-Aug. 2020 703-715 FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.  ...  Zhu, L., +, TDSC July-Aug. 2020 703-715 Embedded systems FourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.  ... 
doi:10.1109/tdsc.2020.3038615 fatcat:vzqqhgq3rrda3atviwpz65ch5e

Four $$\mathbb {Q}$$ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields [chapter]

Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa
2016 Lecture Notes in Computer Science  
All the presented implementations exhibit regular, constant-time execution, protecting against timing and simple side-channel attacks.  ...  factor-2.5 and 2 speedups in comparison with the corresponding variants of the fastest Curve25519 implementation on the same device.  ...  Future work involves the inclusion of strong countermeasures against such attacks.  ... 
doi:10.1007/978-3-662-53140-2_25 fatcat:lnlme2ralvauljvmbyf4svpcsy

Curve25519 for the Cortex-M4 and Beyond [chapter]

Hayato Fujii, Diego F. Aranha
2019 Lecture Notes in Computer Science  
These devices are located towards the lower to mid-end spectrum of ARM cores, and are typically used on embedded devices.  ...  devices.  ...  Side-channel security is achieved using isochronous (constant time) code execution and linear table scan countermeasures.  ... 
doi:10.1007/978-3-030-25283-0_6 fatcat:sbfbbkxs2jey5j6l7g6lrznzyi

Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

Muktar Yahuza, Mohd Yamani Idna Idris, Ismail Bin Ahmedy, Ainuddin Wahid Bin Abdul Wahab, Tarak Nandy, Noorzaily Mohamed Noor, Abubakar Bala
2021 IEEE Access  
According to the authors, a side-channel analysis should be used to detect deadly Trojans.  ...  Moreover, each MEC device can communicate with other MEC devices and the central server through a faster and secure channel.  ... 
doi:10.1109/access.2021.3072030 fatcat:7yqywbuv6rbfvjjgzqtjdanrly

AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT

Björn Haase, Benoît Labrique
2019 Transactions on Cryptographic Hardware and Embedded Systems  
The larger threat of physical attacks makes it important to use memory-hard password hashing.  ...  Increasingly connectivity becomes integrated in products and devices that previously operated in a stand-alone setting.  ...  We also acknowledge inspiring discussions with Daniel Rausch, Ralf Küsters, Denis Kügler, Marc Fischlin, Mike Hamburg and Peter Schwabe.  ... 
doi:10.13154/tches.v2019.i2.1-48 dblp:journals/tches/HaaseL19 fatcat:n7i2bbjhnbdb5dk7ixw3dbftcq

SDN Security Review: Threat Taxonomy, Implications, and Open Challenges

Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Senthil Kumar Jagatheesaperumal, Moussa Ayyash, Maliha Shaheed
2022 IEEE Access  
A specific focus is put forward to address the challenges in securing SDN-based communications, with efforts taken up to address them.  ...  On the one hand, SDN has provided solutions for high-demand resources, managing unpredictable data traffic patterns, and rapid network reconfiguration.  ...  Based on the assessment, the results concluded that relying on userspace increases the latency with fewer samples than the kernel space. For the examination of LFA in SDN, Khan et al.  ... 
doi:10.1109/access.2022.3168972 fatcat:wdjp2kzohjbhvefsjebln2buly

A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles [article]

Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou
2022 arXiv   pre-print
against attacks, and safety standards in CAVs.  ...  There are some surveys with a limited discussion on Attacks Detection and Prevention Systems (ADPS), but such surveys provide only partial coverage of different types of ADPS for CAVs.  ...  Moreover, the adversary can send the same CAN messages with high frequency, overwhelming the network resources to launch a CAN bus-off attack. 7) Side-channel: This attack is performed by analyzing the  ... 
arXiv:2203.14965v1 fatcat:4orttcmbjfei5dbhsjnaovmm7a

TRICKS -time TRIggered Covert Key Sharing for Controller Area Networks

Bogdan Groza, Lucian Popa, Pal-Stefan Murvay
2019 IEEE Access  
We also present the experimental results on modern automotive-grade controllers to prove the performance of our solution.  ...  There are dozens of proposals for securing the controller area network (CAN); however, only a few of them are concerned on how to share secret keys between CAN nodes.  ...  The CAN communication on the embedded platforms side is assured through the on-chip MultiCAN+ module.  ... 
doi:10.1109/access.2019.2931247 fatcat:ycs3lfa3trftdhgw4xvadihleq