Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power analysis
biblio
Safe and Effective Elliptic Curve Cryptography Algorithm against Power Analysis
Submitted by grigby1 on Fri, 07/14/2023 - 2:18pm
pubcrawl
Metrics
resilience
Resiliency
Conferences
Correlation
Scalability
Jitter
Prediction algorithms
Elliptic curve cryptography
Computer applications
algorithm design
codes
cryptographic chips
Elliptic Curve Cryptosystem
power analysis
biblio
Software Implementation of AES-128: Side Channel Attacks Based on Power Traces Decomposition
Submitted by grigby1 on Thu, 06/22/2023 - 12:43pm
deep learning
Training
pubcrawl
Human behavior
Metrics
Software
AES
performance evaluation
Data models
composability
side-channel attacks
microcontrollers
power analysis
decomposition
Power trace decomposition
side channel attacks
biblio
On Attacking IJTAG Architecture based on Locking SIB with Security LFSR
Submitted by grigby1 on Fri, 04/14/2023 - 3:09pm
reverse engineering
SLFSR
power analysis
LSIB
Linear feedback shift registers
known-plaintext attack
IEEE standard 1687
Hybrid power systems
brute force attacks
collaboration
IEEE standards
side-channel attacks
integrated circuits
policy-based governance
Human Factors
Human behavior
pubcrawl
security
biblio
A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks
Submitted by grigby1 on Tue, 05/24/2022 - 12:50pm
Switches
voltage regulator
trng
side channel attacks
power analysis
Regulators
Voltage control
Metals
Resistance
Compositionality
Metrics
Internet of Things
side-channel attacks
composability
Information Assurance
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Submitted by grigby1 on Mon, 11/08/2021 - 12:35pm
Hardware
Trojan horses
trojan horse detection
time-domain analysis
supply chain security
resilience
pubcrawl
Power demand
power analysis
Mahalanobis distance
Integrated circuit modeling
hardware trojan
Time Frequency Analysis and Security
frequency-domain analysis
Fourier transform
encryption
cyber physical systems
cyber physical security
composability
AES encryption circuit
Scalability
Predictive Metrics
Resiliency
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 9:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability
biblio
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
digital signatures
electromagnetic analysis
elliptic curve
Elliptic curve cryptography
Metrics
Physical layer
physical layer security
physical-layer security
power analysis
pubcrawl
Resiliency
side channel attack