Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Suganya Annadurai"'
Publikováno v:
2019 International Carnahan Conference on Security Technology (ICCST).
As the concept of network evolves and diverge for ease of end-to-end communication in a real-time scenario, the unknown problems also rooted with that as a challenge for users. For instance, an advance method of attacking a network system to make it
Publikováno v:
2019 International Carnahan Conference on Security Technology (ICCST).
Diffie-Hellman and RSA encryption/decryption involve computationally intensive cryptographic operations such as modular exponentiation. Computing modular exponentiation using appropriate pre-computed pairs of bases and exponents was first proposed by
Autor:
Suganya Annadurai, Dillibabu Shanmugam
Publikováno v:
iSES
Security evaluation of third-party cryptographic Soft/Hard IP (Intellectual Property) core is often ignored due to several reasons including, lack of awareness about its adversity, lack of knowledge about validation methodology or considering securit
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783319494449
SPACE
SPACE
Lightweight ciphers become indispensable and inevitable in the ubiquitous smart devices. However, the security of ciphers is often subverted by various types of attacks, especially, implementation attacks such as side-channel attacks. These attacks e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::366decc28f939997f79f489ba9af296e
https://doi.org/10.1007/978-3-319-49445-6_10
https://doi.org/10.1007/978-3-319-49445-6_10
Publikováno v:
CPSS@ASIACSS
As Internet of Things (IoT) evolves very rapidly, security components (cryptographic algorithm, protocol) of embedded devices need to be secure against software and physical attacks. However, the performance factors namely speed, area, and power play
Autor:
Suganya Annadurai, Dillibabu Shanmugam
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783319271781
SECITC
SECITC
Trivium is a hardware oriented synchronous stream cipher designed by Christophe De Canniere and Bart Preneel [7]. Trivium is one of the eSTREAM final portfolio cipher. Regardless of the security of the cipher in theory, implementation attacks like Di
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8fa1b1d9f245445738d71b79016d225a
https://doi.org/10.1007/978-3-319-27179-8_18
https://doi.org/10.1007/978-3-319-27179-8_18
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783319120591
SPACE
SPACE
Power analysis attack is one of the most important and effective side channel attack methods, that has been attempted against implementations of cryptographic algorithms. In this paper, we investigate the vulnerability of SIMON [5] and LED [16] light
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0ea6bd31d9cc634fa2a79c9c7eae5667
https://doi.org/10.1007/978-3-319-12060-7_8
https://doi.org/10.1007/978-3-319-12060-7_8