Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …
energy consumption, and bandwidth requirements, making it the most preferred public key …
Time-optimal design of finite field arithmetic for sike on cortex-m4
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
Highly optimized curve448 and ed448 design in wolfssl and side-channel evaluation on cortex-m4
M Anastasova, R El Khatib, A Laclaustra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
The compact key sizes and the low computational latency of the Elliptic Curve Cryptography
(ECC) family of curves sparked high interest in their integration into network protocols. The …
(ECC) family of curves sparked high interest in their integration into network protocols. The …
A survey on security of UAV and deep reinforcement learning
Recently, the use of unmanned aerial vehicles (UAV) s for accomplishing various tasks has
gained a significant interest from both civilian and military organizations due to their …
gained a significant interest from both civilian and military organizations due to their …
Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …
PQC Cloudization: Rapid Prototy** of Scalable NTT/INTT Architecture to Accelerate Kyber
M Bisheh-Niasar, D Lo, A Parthasarathy… - 2023 IEEE Physical …, 2023 - ieeexplore.ieee.org
The advent of quantum computers poses a serious challenge to the security of cloud
infrastructures and services, as they can potentially break the existing public-key …
infrastructures and services, as they can potentially break the existing public-key …
Efficient and Side-Channel Resistant Ed25519 on ARM Cortex-M4
D Owens, R El Khatib, M Bisheh-Niasar… - … on Circuits and …, 2024 - ieeexplore.ieee.org
An estimated 14.7 billion Internet of Things (IoT) devices will be connected to the Internet by
2023. The ubiquity of these devices creates exciting new opportunities, while at the same …
2023. The ubiquity of these devices creates exciting new opportunities, while at the same …
Fully Hybrid TLSv1. 3 in WolfSSL on Cortex-M4
To provide safe communication across an unprotected medium such as the internet, network
protocols are being established. These protocols employ public key techniques to perform …
protocols are being established. These protocols employ public key techniques to perform …