Security in autonomous systems

S Katzenbeisser, I Polian, F Regazzoni… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Autonomous systems promise solutions to a wide range of technical and societal problems,
and their use appears especially attractive in safety-critical domains, like transportation or …

Denoising and error correction in noisy AES-encrypted images using statistical measures

N Islam, Z Shahid, W Puech - Signal Processing: Image Communication, 2016 - Elsevier
Cryptography based techniques are used to secure confidential data from unauthorized
access. These techniques are very good for the security and protection of the data but are …

Threats and Security Issues in Smart City Devices

N Jayapandian - Secure cyber-physical systems for smart cities, 2019 - igi-global.com
The main objective of this chapter is to discuss various security and privacy issues in smart
cities. The development of smart cities involves both the private and public sectors. The …

A novel double-data-rate AES architecture resistant against fault injection

P Maistri, P Vanhauwaert… - Workshop on Fault …, 2007 - ieeexplore.ieee.org
Several techniques have been proposed for encryption blocks in order to provide protection
against faults. These techniques usually exploit some form of redundancy, eg by means of …

On-board encryption in earth observation small satellites

R Banu, T Vladimirova - Proceedings 40th Annual 2006 …, 2006 - ieeexplore.ieee.org
As satellite imaging payloads are providing more and more valuable and sensitive data the
threat of unauthorized access to this data is also increasing. Therefore the demand to protect …

Performance evaluation of hardware models of Advanced Encryption Standard (AES) algorithm

J Yenuguvanilanka, O Elkeelany - IEEE SoutheastCon 2008, 2008 - ieeexplore.ieee.org
In today's world most of the communication is done using electronic media. Data Security
plays a vital role in such communication. Hence, there is a need to protect data from …

Concurrent Error Detection in a Bit-Parallel Systolic Multiplier for Dual Basis of GF(2 m )

CY Lee, CW Chiou, JM Lin - Journal of Electronic Testing, 2005 - Springer
The finite field is widely used in error-correcting codes and cryptography. Among its
important arithmetic operations, multiplication is identified as the most important and …

Countermeasures against fault attacks: The good, the bad, and the ugly

P Maistri - 2011 IEEE 17th International On-Line Testing …, 2011 - ieeexplore.ieee.org
Hardware implementations of cryptographic systems are becoming common, due to new
market needs and to reduced costs. However, the security of a system may be seriously …

An energy-efficient encryption mechanism for NVM-based main memory in mobile systems

D Liu, X Luo, Y Li, Z Shao, Y Guan - Journal of Systems Architecture, 2017 - Elsevier
Emerging non-volatile memory (NVM) has been considered as the most promising
candidate of DRAM for future main memory design in mobile devices. NVM-based main …

[HTML][HTML] Error analysis and detection procedures for elliptic curve cryptography

NF Saudy, IA Ali, R Al Barkouky - Ain Shams Engineering Journal, 2019 - Elsevier
In this paper, a fault detection scheme is introduced with the ability to perform with increased
protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at …