Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for …
The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) …
Number-theoretic transform (NTT) is an efficient polynomial multiplication technique of lattice- based post-quantum cryptography including Kyber which is standardized as the NIST key …
Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate …
By injecting faults, active physical attacks pose serious threats to cryptographic hardware where Concurrent Error Detection (CED) schemes are promising countermeasures. They …
Integrating Field Programmable Gate Arrays (FPGAs) with cloud computing instances is a rapidly emerging trend on commercial cloud computing platforms such as Amazon Web …
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA techniques have evolved, gradually moving towards …
Providing an acceptable level of security at low cost becomes a challenge in embedded systems that have limited resources, eg, Internet of Things application devices. Lightweight …
S Subramanian, M Mozaffari-Kermani… - … on Computer-Aided …, 2017 - ieeexplore.ieee.org
Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be …