A survey on internet of vehicles: Applications, security issues & solutions

S Sharma, B Kaushik - Vehicular Communications, 2019 - Elsevier
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …

Resistance against differential power analysis for elliptic curve cryptosystems

JS Coron - Cryptographic Hardware and Embedded Systems: First …, 1999 - Springer
Abstract Differential Power Analysis, first introduced by Kocher et al. in [14], is a powerful
technique allowing to recover secret smart card information by monitoring power signals. In …

[PDF][PDF] The RC6TM block cipher

RL Rivest, MJB Robshaw, R Sidney… - First advanced …, 1998 - people.csail.mit.edu
We introduce the RC6 TM block cipher. RC6 is an evolutionary improvement of RC5,
designed to meet the requirements of the Advanced Encryption Standard (AES). Like RC5 …

On probability of success in linear and differential cryptanalysis

AA Selçuk - Journal of Cryptology, 2008 - Springer
Despite their widespread usage in block cipher security, linear and differential cryptanalysis
still lack a robust treatment of their success probability, and the success chances of these …

Enhanced block ciphers with data-dependent rotations

RL Rivest, MJB Robshaw, RM Sidney… - US Patent 6,269,163, 2001 - Google Patents
US6269163B1 - Enhanced block ciphers with data-dependent rotations - Google Patents
US6269163B1 - Enhanced block ciphers with data-dependent rotations - Google Patents …

Improved cryptanalysis of RC5

A Biryukov, E Kushilevitz - … '98: International Conference on the Theory and …, 1998 - Springer
RC5 is a fast block cipher designed by Ron Rivest in 1994. Since then several attempts of
cryptanalysis of this cipher were published. The best previously known attack requires 254 …

A timing attack on RC5

H Handschuh, HM Heys - Selected Areas in Cryptography: 5th Annual …, 1999 - Springer
This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is
motivated by the possibility that some implementations of RC5 could result in the data …

Probing attacks on tamper-resistant devices

H Handschuh, P Paillier, J Stern - … , CHES'99 Worcester, MA, USA, August …, 1999 - Springer
This paper describes a new type of attack on tamper-resistant cryptographic hardware. We
show that by locally observing the value of a few RAM or adress bus bits (possibly a single …

From differential cryptanalysis to ciphertext-only attacks

A Biryukov, E Kushilevitz - Advances in Cryptology—CRYPTO'98: 18th …, 1998 - Springer
We present a method for efficient conversion of differential (chosen plaintext) attacks into the
more practical known plaintext and ciphertext-only attacks. Our observation may save up to …

Mod n Cryptanalysis, with Applications against RC5P and M6

J Kelsey, B Schneier, D Wagner - International Workshop on Fast Software …, 1999 - Springer
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against
ciphers which rely on modular addition and bit rotations for their security. We demonstrate …