Towards Efficient Verification of Constant-Time Cryptographic Implementations
Timing side-channel attacks exploit secret-dependent execution time to fully or partially
recover secrets of cryptographic implementations, posing a severe threat to software …
recover secrets of cryptographic implementations, posing a severe threat to software …
Temporal Behavior Analysis and Synthesis for Safety-Critical Transportation Cyber-Physical Systems: A Compositional Approach
The rapid evolution of transportation cyber-physical systems (T-CPS) has led to
unprecedented advancements in mobility and efficiency. However, ensuring the safety and …
unprecedented advancements in mobility and efficiency. However, ensuring the safety and …
Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks
Fault injection attack is a class of active, physical attacks against cryptographic circuits. The
design and implementation of countermeasures against such attacks are intricate, error …
design and implementation of countermeasures against such attacks are intricate, error …
[CITATION][C] Enhancing Block Cipher Security: An Advanced Proposal for S-Box Design
S Abdullah - Journal of Computing and Artificial Intelligence, 2023