Critical infrastructures like the power grid are at risk from increasing cyber threats due to high penetration of interconnected distributed energy resources (DER). Compromised DER …
AT Mozipo, JM Acken - IET Computers & Digital Techniques, 2023 - Wiley Online Library
The protection of communications between Internet of Things (IoT) devices is of great concern because the information exchanged contains vital sensitive data. Malicious agents …
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …
At CCS 2015, Pereira et al. introduced a pragmatic model enabling the study of leakage- resilient symmetric cryptographic primitives based on the minimal use of a leak-free …
Sensitive cryptographic information, eg AES secret keys, can be extracted from the electromagnetic (EM) leakages unintentionally emitted by a device using techniques such …
C Drewes, O Weng, K Ryan, B Hunter… - Proceedings of the …, 2023 - dl.acm.org
Voltage fluctuation sensors measure minute changes in an FPGA power distribution network, allowing attackers to extract information from concurrently executing computations …
The ongoing NIST lightweight standardization process explicitly puts forward a requirement of side-channel security, which has renewed the interest for Authenticated Encryption …
J Dofe, H Pahlevanzadeh, Q Yu - Journal of Electronic Testing, 2016 - Springer
The secret key used in a cryptosystem can be retrieved by physical attacks such as side- channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for …
We propose definitions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of nonce misuse and side-channel information leakage …