A survey on internet of vehicles: Applications, security issues & solutions

S Sharma, B Kaushik - Vehicular Communications, 2019 - Elsevier
Abstract Internet of Vehicles (IoV) is an emerging concept in intelligent transportation
systems (ITS) to enhance the existing capabilities of VANETs by integrating with the Internet …

Cache-access pattern attack on disaligned aes t-tables

R Spreitzer, T Plos - Constructive Side-Channel Analysis and Secure …, 2013 - Springer
Cache attacks are a special form of implementation attacks and focus on the exploitation of
weaknesses in the implementation of a specific algorithm. We demonstrate an access-driven …

[BOOK][B] Timing channels in cryptography: a micro-architectural perspective

C Rebeiro, D Mukhopadhyay, S Bhattacharya - 2014 - books.google.com
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes
various unintended covert timing channels that are formed when ciphers are executed in …

[PDF][PDF] Survey on lightweight block cipher

S Jana, J Bhaumik, MK Maiti - International Journal of Soft Computing and …, 2013 - Citeseer
With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless
sensor nodes are deployed in increasing numbers each and every day. Such devices are …

Boosting profiled cache timing attacks with a priori analysis

C Rebeiro, D Mukhopadhyay - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The vulnerability of cryptographic devices to side-channel attacks is of interest in the domain
of information security. The success of a side-channel attack depends on the crypto …

Micro-architectural analysis of time-driven cache attacks: quest for the ideal implementation

C Rebeiro, D Mukhopadhyay - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Time-driven attacks on the data cache are a lethal form of cryptanalytic attacks for block-
ciphers implemented with look-up tables. The difference of means (DOM) observed in the …

Why cryptography should not rely on physical attack complexity

J Krämer - it-Information Technology, 2017 - degruyter.com
This work presents two implementation attacks against cryptographic algorithms. Based on
these two presented attacks, this thesis shows that the assessment of physical attack …

A security verification template to assess cache architecture vulnerabilities

T Ghasempouri, J Raik, K Paul… - … on Design and …, 2020 - ieeexplore.ieee.org
In the recent years, cache based side-channel attacks have become a serious threat for
computers. To face this issue, researches have been looking at verifying the security …

Formalizing the Effect of Feistel cipher structures on differential cache attacks

C Rebeiro, PH Nguyen… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
The success of a side-channel attack depends mainly on three factors, namely, the cipher
algorithm, the attack platform, and the measurement noise. In this paper, we consider a class …

On the optimality of differential fault analyses on CLEFIA

Á Kiss, J Krämer, A Stüber - … on Mathematical Aspects of Computer and …, 2015 - Springer
Abstract In 2012, several Differential Fault Analyses on the AES cipher were analyzed from
an information-theoretic perspective. This analysis exposed whether or not the leaked …