Zobrazeno 1 - 10
of 127
pro vyhledávání: '"Ventzislav Nikov"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Over the last decades, fault injection attacks have been demonstrated to be an effective method for breaking the security of electronic devices. Some types of fault injection attacks, like clock and voltage glitching, require very few resources by th
Externí odkaz:
https://doaj.org/article/987ea5bc7f3a43c7bf1acdd048828a63
Autor:
Eduardo Alvarenga, Jan R. Brands, Peter Doliwa, Jerry den Hartog, Erik Kraft, Marcel Medwed, Ventzislav Nikov, Joost Renes, Martin Rosso, Tobias Schneider, Nikita Veshchikov
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-16
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
Cryptographic implementations on embedded systems need to be protected against physical attacks. Today, this means that apart from incorporating countermeasures against side-channel analysis, implementations must also withstand fault attacks and comb
Externí odkaz:
https://doaj.org/article/07fe3c50f51d4b8292a11ce0884d5175
ispartof: JOURNAL OF CRYPTOGRAPHIC ENGINEERING vol:12 issue:1 pages:15-51 status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::50cbdb40c9a88811d5da0f639164546f
https://lirias.kuleuven.be/handle/123456789/685073
https://lirias.kuleuven.be/handle/123456789/685073
Publikováno v:
CSR
Modern embedded IoT devices are an attractive target for cyber attacks. For example, they can be used to disable entire factories and ask for ransom. Recovery of compromised devices is not an easy task, because malware can subvert the original softwa
Autor:
Maria Eichlseder, Ventzislav Nikov, Shahram Rasoolzadeh, Thorben Moos, Dušan Božilov, Gregor Leander, Baptiste Lambin, Friedrich Wiemer, Yosuke Todo, Miroslav Knezevic
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030816513
SAC
SAC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9701d1c45b03b5a55380c787d0018ea5
https://doi.org/10.1007/978-3-030-81652-0_19
https://doi.org/10.1007/978-3-030-81652-0_19
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030420673
CARDIS
CARDIS
Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In this work, we first provide a generic construction for \(d+1\) TI sharing which achieves the minima
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::efd089095f5d74cfb0d1d9d5f55c8072
https://doi.org/10.1007/978-3-030-42068-0_2
https://doi.org/10.1007/978-3-030-42068-0_2
Publikováno v:
Cryptography and Communications. 11:379-384
© 2018, Springer Science+Business Media, LLC, part of Springer Nature. We describe a method to decompose any power permutation, as a sequence of power permutations of lower algebraic degree. As a result we obtain decompositions of the inversion in G
Publikováno v:
ICECS
With the expansion of the IoT and the emergence of vast amounts of remote hardware devices side-channel attacks pose a serious threat, requiring adequate protection. Among the hardware countermeasures, Threshold Implementations (TI) is one of the mos
© 2019, Springer Science+Business Media, LLC, part of Springer Nature. In this paper we focus on S-box constructions. We consider the uniformity property of an S-box which plays an important role in Threshold Implementations (TI). Most papers so far
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d2535eddd5281dd12555e46b779cc3ef
https://lirias.kuleuven.be/handle/123456789/645162
https://lirias.kuleuven.be/handle/123456789/645162