[HTML][HTML] A review on recent advancement of electromagnetic interference shielding novel metallic materials and processes

D Wanasinghe, F Aslani - Composites Part B: Engineering, 2019 - Elsevier
The demand for new materials in the field of electromagnetic interference shielding has
increased dramatically in the last few decades due to the advancements in the electronics …

The security in optical wireless communication: A survey

X Zhang, G Klevering, X Lei, Y Hu, L Xiao… - ACM Computing …, 2023 - dl.acm.org
With the demand for economical and high-speed wireless services, Optical Wireless
Communication (OWC) has attracted increasing attention in both research and the market. In …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

Information hiding-a survey

FAP Petitcolas, RJ Anderson… - Proceedings of the …, 1999 - ieeexplore.ieee.org
Information-hiding techniques have recently become important in a number of application
areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but …

Electromagnetic analysis: Concrete results

K Gandolfi, C Mourtel, F Olivier - … Workshop Paris, France, May 14–16 …, 2001 - Springer
Although the possibility of attacking smart-cards by analyzing their electromagnetic power
radiation repeatedly appears in research papers, all accessible references evade the …

Private circuits: Securing hardware against probing attacks

Y Ishai, A Sahai, D Wagner - Advances in Cryptology-CRYPTO 2003: 23rd …, 2003 - Springer
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider
the problem of protecting privacy in c ircuits, when faced with an adversary that can access a …

Security as a new dimension in embedded system design

P Kocher, R Lee, G McGraw… - Proceedings of the 41st …, 2004 - dl.acm.org
The growing number of instances of breaches in information security in the last few years
has created a compelling case for efforts towards secure electronic systems. Embedded …

[图书][B] Disappearing cryptography: information hiding: steganography and watermarking

P Wayner - 2009 - books.google.com
Cryptology is the practice of hiding digital information by means of various obfuscatory and
steganographic techniques. The application of said techniques facilitates message …

Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations

M Guri, M Monitz, Y Mirski… - 2015 IEEE 28th Computer …, 2015 - ieeexplore.ieee.org
It has been assumed that the physical separation ('air-gap') of computers provides a reliable
level of security, such that should two adjacent computers become compromised, the covert …

Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …