A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …

Lightweight security scheme for mqtt/mqtt-sn protocol

O Sadio, I Ngom, C Lishou - 2019 sixth international …, 2019 - ieeexplore.ieee.org
In the coming years, sensors will likely have a permeated every aspect of our life. Several
works explain how the Internet of things (IoT) will have an impact on almost all aspects of our …

ChaCha20–Poly1305 authenticated encryption with additional data for transport layer security 1.3

R Serrano, C Duran, M Sarmiento, CK Pham… - Cryptography, 2022 - mdpi.com
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in
computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3 …

Security of autonomous vehicle as a cyber-physical system

A Chattopadhyay, KY Lam - 2017 7th International Symposium …, 2017 - ieeexplore.ieee.org
Security of (semi)-autonomous vehicles is a growing concern due to, first, the growing
reliance of car functionalities on diverse (semi)-autonomous systems; second, the increased …

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

R Ueno, N Homma, A Inoue… - IACR Transactions on …, 2024 - tches.iacr.org
This paper presents a provably secure, higher-order, and leakage-resilient (LR) rekeying
scheme named LR Rekeying with Random oracle Repetition (LR4), along with a …

Bricklayer attack: a side-channel analysis on the ChaCha quarter round

A Adomnicai, JJA Fournier, L Masson - International Conference on …, 2017 - Springer
ChaCha is a family of stream ciphers that are very efficient on constrainted platforms. In this
paper, we present electromagnetic side-channel analyses for two different software …

Deriving ChaCha20 key streams from targeted memory analysis

P McLaren, WJ Buchanan, G Russell, Z Tan - Journal of Information …, 2019 - Elsevier
There can be performance and vulnerability concerns with block ciphers, thus stream
ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly …

Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2

L Vlasak, A Bouvet, S Guilley - International Conference on Cryptology in …, 2023 - Springer
Cryptographic hashing with secret key is widely used for message authentication, eg, in the
popular HMAC protocol. This algorithm is a suitable target for vertical Side-Channel …

Rethinking the weakness of stream ciphers and its application to encrypted malware detection

W Stone, D Kim, VY Kemmoe, M Kang, J Son - IEEE Access, 2020 - ieeexplore.ieee.org
One critical vulnerability of stream ciphers is the reuse of an encryption key. Since most
stream ciphers consist of only a key scheduling algorithm and an Exclusive OR (XOR) …

[PDF][PDF] Performance of message authentication codes for secure ethernet

P Hagenlocher - Network, 2018 - academia.edu
Cyclic redundancy checks within Ethernet do not provide data integrity, which can be solved
by using message authentication codes (MACs) within Ethernet frames. This paper gives …