5G networks: Types of isolation and their parameters in RAN and CN slices

Z Kotulski, TW Nowak, M Sepczuk, MA Tunia - Computer Networks, 2020 - Elsevier
In this paper, we present a systematic overview of existing isolation techniques in nodes and
networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …

[PDF][PDF] Innovative method of the power analysis

Z Martinasek, V Zeman - Radioengineering, 2013 - radioeng.cz
This paper describes an innovative method of the power analysis which presents the typical
example of successful attacks against trusted cryptographic devices such as RFID (Radio …

[HTML][HTML] Single trace side channel analysis on NTRU implementation

S An, S Kim, S **, HB Kim, HS Kim - Applied Sciences, 2018 - mdpi.com
As researches on the quantum computer have progressed immensely, interests in post-
quantum cryptography have greatly increased. NTRU is one of the well-known algorithms …

A Survey of Side-Channel Attacks in Context of Cache--Taxonomies, Analysis and Mitigation

A Pulkit, S Naval, V Laxmi - arxiv preprint arxiv:2312.11094, 2023 - arxiv.org
Side-channel attacks have become prominent attack surfaces in cyberspace. Attackers use
the side information generated by the system while performing a task. Among the various …

A hybrid SAT and lattice reduction approach for integer factorization

Y Ajani - 2024 - search.proquest.com
The difficulty of factoring large integers into primes is the basis for cryptosystems such as
RSA. Due to the widespread popularity of RSA, there have been many proposed attacks on …

Power analysis attack based on the MLP in DPA contest v4

Z Martinasek, O Zapletal, K Vrba… - 2015 38th International …, 2015 - ieeexplore.ieee.org
Power analysis represents extremely effective and successful way of side-channels attacks
on so far confidential cryptographic algorithms and cryptographic devices. One of the …

[HTML][HTML] A new LSB attack on special-structured RSA primes

AH Abd Ghafar, MR Kamel Ariffin, MA Asbullah - Symmetry, 2020 - mdpi.com
Asymmetric key cryptosystem is a vital element in securing our communication in
cyberspace. It encrypts our transmitting data and authenticates the originality and integrity of …

Taxonomy and Statistics of Cyber and Physical Vulnerabilities in Medical Devices

FMC Nanni, F Lestini… - 2024 9th International …, 2024 - ieeexplore.ieee.org
This study introduces a taxonomy for analyzing cyber and physical vulnerabilities in medical
devices, emphasizing the critical interplay between security and safety. An analysis of …

Harnessing Heterogeneity for Targeted Attacks on 3-D ICs

A Aversa, I Savidis - Proceedings of the Great Lakes Symposium on VLSI …, 2024 - dl.acm.org
As 3-D integrated circuits (ICs) increasingly pervade the microelectronics industry, the
integration of heterogeneous components presents a unique challenge from a security …

[PDF][PDF] Wireless reconfigurability of electromagnetic devices through rfid passive technology

F Lestini, G Marrocco, C Occhiuzzi - URSI Radio Science Letters, 2024 - academia.edu
The growing demand for advanced wireless communication systems has underscored the
urgent need for electromagnetic devices capable of adapting to diverse operational …