Zobrazeno 1 - 10
of 129
pro vyhledávání: '"Rezaei Shahmirzadi A"'
Autor:
Ikhlasi, Zakir, Valizadeh Kiamahalleh, Mohammad, Gholampour, Aliakbar, Rezaei Shahmirzadi, Mohsen, Ngo, Tuan D.
Publikováno v:
Innovative Infrastructure Solutions; 11/12/2024, Vol. 9 Issue 12, p1-17, 17p
Publikováno v:
In Construction and Building Materials 15 December 2023 409
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)
Masking schemes are the most popular countermeasure to mitigate Side-Channel Analysis (SCA) attacks. Compared to software, their hardware implementations require certain considerations with respect to physical defaults, such as glitches. To counter t
Externí odkaz:
https://doaj.org/article/8020292eb06c44ada56d387922fc7cd2
Autor:
Valizadeh Kiamahalleh, Mohammad, Gholampour, Aliakbar, Rezaei Shahmirzadi, Mohsen, Ngo, Tuan D., Ozbakkaloglu, Togay
Publikováno v:
Materials (1996-1944); Jun2024, Vol. 17 Issue 11, p2608, 21p
Autor:
Rezaei Shahmirzadi, Mohsen, Gholampour, Aliakbar, Hosseini, Seyed Amirhossein, Ngo, Tuan D., Nematzadeh, Mahdi
Publikováno v:
Structural Concrete; Aug2024, Vol. 25 Issue 4, p2931-2946, 16p
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. The main idea lies on a combination of the constructions given by Shahmirzadi and
Externí odkaz:
https://doaj.org/article/3bb2fde083c94208b0257cc864809569
Autor:
Doosti-Irani, Amin, Tamtaji, Omid Reza, Mansournia, Mohammad Ali, Ghayour- Mobarhan, Majid, Ferns, Gordon, Daneshvar Kakhaki, Reza, Rezaei Shahmirzadi, Arash, Asemi, Zatollah
Publikováno v:
In Clinical Neurology and Neurosurgery December 2019 187
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
Fault Injection Analysis is seen as a powerful attack against implementations of cryptographic algorithms. Over the last two decades, researchers proposed a plethora of countermeasures to secure such implementations. However, the design process and i
Externí odkaz:
https://doaj.org/article/2bba77992a1a41c699a31b8e544550e1
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
Correct application of masking on hardware implementation of cryptographic primitives necessitates the instantiation of registers in order to achieve the non-completeness (commonly said to stop the propagation of glitches). This sometimes leads to a
Externí odkaz:
https://doaj.org/article/741c5107cdfd4780b577e750c8246a80
Autor:
Aein Rezaei Shahmirzadi, Amir Moradi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
Masking schemes are among the most popular countermeasures against Side-Channel Analysis (SCA) attacks. Realization of masked implementations on hardware faces several difficulties including dealing with glitches. Threshold Implementation (TI) is kno
Externí odkaz:
https://doaj.org/article/aa72c24d445b4882b158a9506c3f6068