Load-step: A precise trustzone execution control framework for exploring new side-channel attacks like flush+ evict

Z Kou, W He, S Sinha, W Zhang - 2021 58th ACM/IEEE Design …, 2021 - ieeexplore.ieee.org
Trusted execution environments (TEEs) are imported into processors to protect sensitive
programs against a potentially malicious operating system (OS), though, they are …

Study on modified public key cryptosystem based on elgamal and cramer-shoup cryptosystems

SR Kim, R Kyung - 2023 IEEE 13th Annual Computing and …, 2023 - ieeexplore.ieee.org
The current encryption scheme depends on the fact that there is a shared secret whose
value is only computable. Cramer and Shoup suggested a strategy for improving an existing …

Cache Side-Channel Attacks and Defenses in Constrained Environments

Z Kou - 2024 - search.proquest.com
Cache side-channel attacks exploit the shared nature and performance attributes, the timing
discrepancies between cache misses and hits, of cache systems to extract sensitive …

[PDF][PDF] Constructing Representative Collective Signature Protocols Using The GOST R34. 10-1994 Standard.

TN Kim, DH Ngoc, NA Moldovyan - Computers, Materials & …, 2023 - researchgate.net
The representative collective digital signature, which was suggested by us, is built based on
combining the advantages of group digital signature and collective digital signature. This …

Aplikasi Teorema Fermat dalam Kriptografi

H Al Affiani, MD Johansyah… - Mathematical …, 2024 - mail.online-journal.unja.ac.id
Cryptography is the science and technique of disguising messages in a unique form so that
they can only be read and processed by the intended recipient. Many studies have been …

[PDF][PDF] A secure, traceable, and efficiently revocable cloud-based access control scheme using ciphertext policy attribute-based encryption and blockchain

K Worapaluk, S Fugkeaw - 2023 - ethesisarchive.library.tu.ac.th
ABSTRACT Ciphertext Policy Attributed-based Encryption (CP-ABE) is considered as a
suitable solution for supporting secure and fine-grained access control for outsourced data …

[PDF][PDF] Software Encryption in Mobile Devices

J Nordwall - 2013 - diva-portal.org
This thesis is based on peoples need to be able to encrypt sensitive data on their mobile
devices. The application will allow them to do so effortless, and also ensure them that the …