A hybrid addition chaining based light weight security mechanism for enhancing quality of service in IoT

A Jayaram, S Deb - Wireless Personal Communications, 2020 - Springer
Abstract IoT in Wireless Sensor Networkis a network of physical objects connected to
internet such as RFID and sensors. As these types of objects have limited computation …

Contribution de l'arithmétique des ordinateurs aux implémentations résistantes aux attaques par canaux auxiliaires

FY Dosso - 2020 - theses.hal.science
Cette thèse porte sur deux éléments actuellement incontournables de la cryptographie à clé
publique, qui sont l'arithmétique modulaire avec de grands entiers et la multiplication …

Hardware-Software Co-Design for Security: ECC Processor Example

A Tisserand - Workshop on the Security of Software/Hardware …, 2019 - hal.science
Designing accelerators or blocks for security and cryptography in hardware usually leads to
mode efficient and secure solutions than pure software implementations. But this can also …

Cache timing attacks countermeasures and error detection in Euclidean addition chains based scalar multiplication algorithm for elliptic curves

FY Dosso, P Véron - … IEEE 23rd International Symposium on On …, 2017 - ieeexplore.ieee.org
Cache timing attacks countermeasures and error detection in Euclidean addition chains based
scalar multiplication algorithm for Page 1 Cache timing attacks countermeasures and error …