Intelligent low cost telecontrol system for agricultural vehicles in harmful environments

JA Gázquez, NN Castellano… - Journal of Cleaner …, 2016 - Elsevier
The use of vehicles to control pests and crop diseases is needed to maintain agricultural
production. This paper describes how to design and implement a low cost intelligent …

Side-channel security analysis of UOV signature for cloud-based Internet of Things

H Yi, Z Nie - Future Generation Computer Systems, 2018 - Elsevier
Abstract Among Internet of Things (IoTs), cloud-based IoTs help retain the confidentiality of
both device-to-cloud and cloud-to-device messages by setting up individual identities and …

A new approach for side channel analysis on stream ciphers and related constructions

A Baksi, S Kumar, S Sarkar - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices
performing a cryptographic operation. While such analysis is well studied against the block …

On the security of MQ cryptographic systems for constructing secure Internet of medical things

H Yi, Z Nie - Personal and Ubiquitous Computing, 2018 - Springer
Abstract The Internet of Medical Things (IoMTs) are the group of medical devices connected
to Internet, to perform the processes and services that support healthcare. The amount of …

Dapa: differential analysis aided power attack on (non-) linear feedback shift registers (extended version)

SM Sim, D Jap, S Bhasin - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs
statistical analysis on the power traces of cryptographic computations. DPA is applicable to …

A novel method for power analysis based on combinational logic in block cipher circuit

Z GUO, D GU, K YUAN, J LIU… - Chinese Journal of …, 2014 - cje.ejournal.org.cn
In this paper, we propose a method that builds power model template according to input
transitions of combinatorial logic circuit. By computing its correlation with the overall power …

Differential Power Analysis on (Non-) Linear Feedback Shift Registers

SM Sim - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Differential power analysis (DPA) is a statistical analysis of the power traces of cryptographic
computations. DPA has many applications including key-recovery on linear feedback shift …

A combinational power analysis method against cryptographic hardware

Z Guo, D Gu, H Lu, J Liu, S Xu, S Bao… - China …, 2015 - ieeexplore.ieee.org
Power analysis is a non-invasive attack against cryptographic hardware, which effectively
exploits runtime power consumption characteristics of circuits. This paper proposes a new …

SPONGE structure in the basis of a new stream cipher

A Ikramov, M Aripov, G Juraev - American Institute of Physics …, 2023 - ui.adsabs.harvard.edu
We propose the special stream algorithm based on the SPONGE structure in order to obtain
a secure and fast encryption algorithm. It uses simple operations and a large internal …

Enhanced side-channel leakage detection method by considering combinational logic

J Liu, Z Guo, D Gu, Y Yu, H Lu, H Gu… - China …, 2015 - ieeexplore.ieee.org
In this paper, we propose a hybrid power model that includes the power consumption of not
only the registers but also part of the combinational logic. By doing knownkey analysis with …