On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

Improved side-channel analysis attacks on Xilinx bitstream encryption of 5, 6, and 7 series

A Moradi, T Schneider - … workshop on constructive side-channel analysis …, 2016 - Springer
Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs
can be broken by side-channel analysis. Presented at CT-RSA 2012, using graphics …

The request for better measurement: A comparative evaluation of two-factor authentication schemes

D Wang, Q Gu, H Cheng, P Wang - Proceedings of the 11th ACM on …, 2016 - dl.acm.org
Despite over two decades of continuous efforts, how to design a secure and efficient two-
factor authentication scheme remains an open issue. Hundreds of new schemes have wave …

Side-channel countermeasures' dissection and the limits of closed source security evaluations

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
We take advantage of a recently published open source implementation of the AES
protected with a mix of countermeasures against side-channel attacks to discuss both the …

TEDT, a leakage-resist AEAD mode for high physical security applications

F Berti, C Guo, O Pereira, T Peters… - IACR Transactions on …, 2020 - tches.iacr.org
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …

Side-Channel Analysis Protection and Low-Latency in Action: –Case Study of PRINCE and Midori–

A Moradi, T Schneider - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016 - Springer
During the last years, the industry sector showed particular interest in solutions which allow
to encrypt and decrypt data within one clock cycle. Known as low-latency cryptography, such …

Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction

W Li, P Wang - Future Generation Computer Systems, 2019 - Elsevier
Due to the sensitiveness of the physical environments and resource-constrained nature of
edge devices, how to securely and efficiently access real-time data in Industrial Internet-of …

A systematic analysis method for 5g non-access stratum signalling security

X Hu, C Liu, S Liu, W You, Y Li, Y Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
This paper proposes a systematic analysis method for 5G Non-Access Stratum Signalling
security based on formal analysis, which has identified 10 new 5G protocol vulnerabilities …

Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards

J Liu, Y Yu, FX Standaert, Z Guo, D Gu, W Sun… - … --ESORICS 2015: 20th …, 2015 - Springer
Side-channel attacks are an increasingly important concern for the security of cryptographic
embedded devices, such as the SIM cards used in mobile phones. Previous works have …