Towards Efficient Verification of Constant-Time Cryptographic Implementations

L Cai, F Song, T Chen - Proceedings of the ACM on Software …, 2024 - dl.acm.org
Timing side-channel attacks exploit secret-dependent execution time to fully or partially
recover secrets of cryptographic implementations, posing a severe threat to software …

Temporal Behavior Analysis and Synthesis for Safety-Critical Transportation Cyber-Physical Systems: A Compositional Approach

H Zhu, H Xu, X Xue, BG Kim… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid evolution of transportation cyber-physical systems (T-CPS) has led to
unprecedented advancements in mobility and efficiency. However, ensuring the safety and …

Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks

H Tan, X Yang, F Song, T Chen, Z Wu - International Symposium on …, 2024 - Springer
Fault injection attack is a class of active, physical attacks against cryptographic circuits. The
design and implementation of countermeasures against such attacks are intricate, error …

[CITATION][C] Enhancing Block Cipher Security: An Advanced Proposal for S-Box Design

S Abdullah - Journal of Computing and Artificial Intelligence, 2023