Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
simple power analysis
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 4:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Side-Channel Attacks on Fingerprint Matching Algorithms
Submitted by grigby1 on Wed, 08/02/2017 - 2:14pm
biometric encryption
biometrics
biometry
bozorth3
collaboration
composability
fingerprint matching
Human behavior
Metrics
pubcrawl
Resiliency
Scalability
side-channel analysis
simple power analysis
biblio
Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks
Submitted by grigby1 on Mon, 06/05/2017 - 12:25pm
Differential Power Analysis
Elliptic Curve Cryptosystem
Elliptic Curve Scalar Multiplication
Human behavior
Metrics
pubcrawl
random key generation
Resiliency
Scalability
simple power analysis
biblio
Buffer Overflow Attack's Power Consumption Signatures
Submitted by grigby1 on Mon, 04/03/2017 - 11:52am
channel coding
composability
Cyber Dependencies
cyber physical security
ICS Anomaly Detection
Metrics
Physical layer
physical layer security
physical-layer security
power consumption anomaly detection
pubcrawl
Resiliency
rop attacks
Scalability
side-channel analysis
simple power analysis