A survey on internet of vehicles: Applications, security issues & solutions
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …
Cache-access pattern attack on disaligned aes t-tables
R Spreitzer, T Plos - Constructive Side-Channel Analysis and Secure …, 2013 - Springer
Cache attacks are a special form of implementation attacks and focus on the exploitation of
weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven …
weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven …
[BOOK][B] Timing channels in cryptography: a micro-architectural perspective
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes
various unintended covert timing channels that are formed when ciphers are executed in …
various unintended covert timing channels that are formed when ciphers are executed in …
[PDF][PDF] Survey on lightweight block cipher
With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless
sensor nodes are deployed in increasing numbers each and every day. Such devices are …
sensor nodes are deployed in increasing numbers each and every day. Such devices are …
Boosting profiled cache timing attacks with a priori analysis
The vulnerability of cryptographic devices to side-channel attacks is of interest in the domain
of information security. The success of a side-channel attack depends on the crypto …
of information security. The success of a side-channel attack depends on the crypto …
Micro-architectural analysis of time-driven cache attacks: quest for the ideal implementation
Time-driven attacks on the data cache are a lethal form of cryptanalytic attacks for block-
ciphers implemented with look-up tables. The difference of means (DOM) observed in the …
ciphers implemented with look-up tables. The difference of means (DOM) observed in the …
Why cryptography should not rely on physical attack complexity
J Krämer - it-Information Technology, 2017 - degruyter.com
This work presents two implementation attacks against cryptographic algorithms. Based on
these two presented attacks, this thesis shows that the assessment of physical attack …
these two presented attacks, this thesis shows that the assessment of physical attack …
A security verification template to assess cache architecture vulnerabilities
In the recent years, cache based side-channel attacks have become a serious threat for
computers. To face this issue, researches have been looking at verifying the security …
computers. To face this issue, researches have been looking at verifying the security …
Formalizing the Effect of Feistel cipher structures on differential cache attacks
The success of a side-channel attack depends mainly on three factors, namely, the cipher
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …
On the optimality of differential fault analyses on CLEFIA
Abstract In 2012, several Differential Fault Analyses on the AES cipher were analyzed from
an information-theoretic perspective. This analysis exposed whether or not the leaked …
an information-theoretic perspective. This analysis exposed whether or not the leaked …