[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
Boolean functions for cryptography and coding theory
C Carlet - 2021 - books.google.com
Boolean functions are essential to systems for secure and reliable communication. This
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
comprehensive survey of Boolean functions for cryptography and coding covers the whole …
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
Machine learning has become mainstream across industries. Numerous examples prove the
validity of it for security applications. In this work, we investigate how to reverse engineer a …
validity of it for security applications. In this work, we investigate how to reverse engineer a …
Masking kyber: First-and higher-order implementations
In the final phase of the post-quantum cryptography standardization effort, the focus has
been extended to include the side-channel resistance of the candidates. While some …
been extended to include the side-channel resistance of the candidates. While some …
Strong non-interference and type-directed higher-order masking
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …
cryptographic material by measuring and analyzing the power consumption of the device on …
Composable masking schemes in the presence of physical defaults & the robust probing model
Composability and robustness against physical defaults (eg, glitches) are two highly
desirable properties for secure implementations of masking schemes. While tools exist to …
desirable properties for secure implementations of masking schemes. While tools exist to …
A comprehensive study of deep learning for side-channel analysis
Recently, several studies have been published on the application of deep learning to
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …
enhance Side-Channel Attacks (SCA). These seminal works have practically validated the …
IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
Higher-order threshold implementations
Higher-order differential power analysis attacks are a serious threat for cryptographic
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
hardware implementations. In particular, glitches in the circuit make it hard to protect the …
Unifying leakage models: from probing attacks to noisy leakage.
A recent trend in cryptography is to formally show the leakage resilience of cryptographic
implementations in a given leakage model. A realistic model is to assume that leakages are …
implementations in a given leakage model. A realistic model is to assume that leakages are …