An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks

RA Al-Kaabi, HF Fakhruldeen… - AIP Conference …, 2023 - pubs.aip.org
In modern applications, such as real-time applications, high-speed end-to-end transmission
sometimes conflicts with the requirements of confidentiality and security. One of the most …

Efficient error detection schemes for ECSM window method benchmarked on FPGAs

K Ahmadi, S Aghapour, MM Kermani… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
Elliptic curve scalar multiplication (ECSM) stands as a crucial subblock in elliptic curve
cryptography (ECC), which represents the most widely used prequantum public key …

Error‐correcting cryptographic S‐boxes with multiple error detection and correction

B Rashidi - International Journal of Circuit Theory and …, 2023 - Wiley Online Library
In this paper, the error‐correcting 4‐bit S‐boxes for cryptography applications with multiple
error detection and correction are presented. Three 4‐bit S‐boxes which are used in the …

Error Detection Schemes for τ NAF Conversion within Koblitz Curves Benchmarked on Various ARM Processors

K Ahmadi, S Aghapour, MM Kermani… - Authorea …, 2023 - techrxiv.org
Elliptic curves cryptography, the most widely-deployed pre-quantum public key
cryptography, can be implemented efficiently with Koblitz curves. The reason for these …

Software Countermeasures against DVFS fault Attack for AES

Z Tao, R Sun, J Dong - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Most modern processors utilize Dynamic Voltage and Frequency Scaling (DVFS) technology
to dynamically adjust voltage and frequency according to the workloads of processors to …

SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits

H Tan, P Gao, T Chen, F Song, Z Wu - arXiv preprint arXiv:2307.00561, 2023 - arxiv.org
Fault injection attacks represent a type of active, physical attack against cryptographic
circuits. Various countermeasures have been proposed to thwart such attacks, the design …

Attacks on continuous chaos communication and remedies for resource limited devices

R Vishwakarma, R Monani, A Rezaei… - … on Quality Electronic …, 2023 - ieeexplore.ieee.org
The Global Wearable market is anticipated to rise at a considerable rate in the next coming
years and communication is a fundamental block in any wearable device. In communication …

Assessment of Radiation-Induced Soft Errors on Lightweight Cryptography Algorithms Running on a Resource-Constrained Device

J Gava, N Moura, J Lucena, V da Rocha… - … on Nuclear Science, 2023 - ieeexplore.ieee.org
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC)
algorithms to provide security at minimum power and performance overhead. LWC …

基于周期耦合处理的CAN 总线数据组合加密方法

秦武韬, 王鹏, 李玉峰 - 通信学报, 2023 - infocomm-journal.com
针对智能网联时代控制器局域网络(CAN) 总线传输轻量化安全加密的需求, 提出了一种响应快,
安全性高的CAN 总线数据加密方法, 针对64 位CAN 报文周期性发送特点, 设计与报文传输周期 …

Post Quantum Cryptography Algorithms: A Review and Applications Check for updates

B Paul, G Trivedi - … of 7th ASRES International Conference on …, 2023 - books.google.com
Recent development in the field of quantum computing pushed classical cryptosystem on
the verge of serious security threat. Quantum cryptography employing quantum channel and …