The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Side-channel attack utilizes side-channel leakages to extract the secret in crypto systems. Various countermeasures for different algorithms and platforms have been proposed to protect crypto systems against such attacks. Manual countermeasure design requires deep understanding of the target algorithm and implementation, and oftentimes is platform-specific and error-prone. In this paper, we propose...
The magnetoimpedance (MI) effect is known as a large and sensitive change in a voltage measured across a magnetic conductor carrying a high frequency current.
A considerable amount of interest in the field of applied magnetism has been devoted to investigating amorphous-magnetically soft microwires due to their local dimensionality, cost-effective fabrication, interesting soft magnetic properties [1–3], large magnetoimpedance (MI) [4–5] and stress-magnetoimpedance [6–7].
The magnetoimpedance (MI) effect is known as a large and sensitive change in a complex resistance of a magnetic conductor carrying a high frequency current.
XTS-AES is an advanced mode of AES for data protection of sector-based devices. Compared to other AES modes, it features two secret keys instead of one, and an additional tweak for each data block. These characteristics make the mode not only resistant against cryptoanalysis attacks, but also more challenging for side-channel attack. In this paper, we propose two attack methods on XTS-AES overcoming...
This paper presents an innovative control scheme for the multilevel inverter that is connected to the power grid as a Distributed Generation unit, DG. The paper demonstrates novel application for the voltage orientation control, also called voltage vector control, so as to precisely control active and reactive power injected by the distributed generation units in a normal operation of the system,...
The security of SHA-3 against different kinds of attacks are of vital importance for crypto systems with SHA-3 as the security engine. In this paper, we look into the differential fault analysis of SHA-3, and this is the first work to conquer SHA3-224 and SHA3-256 using differential fault analysis. Comparing with one existing related work, we relax the fault models and make them realistic for different...
A finite element model for epidermal wound healing is proposed. The model takes into account the sequential steps of angiogenesis (neo-vascularization) and wound contraction (the actual healing of a wound). An innovation in the present study is the combination of both partially overlapping processes, yielding novel insights into the process of wound healing. The models consist of nonlinearly coupled...
Dietary fiber has long been recommended as part of a healthy diet based on the observations made by Burkitt and Trowell (1975). Since then, epidemiological evidence has consistently shown that populations consuming higher levels of foods containing fiber have decreased risk of a variety of chronic health disorders such as cardiovascular disease, type II diabetes, and certain cancers. Average fiber...
Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling...
A common algorithm-level effective countermea-sure against side-channel attacks is random masking. However, second-order attack can break first-order masked devices by utilizing power values at two time points. Normally 2nd-order attacks require the exact temporal locations of the two leakage points. Without profiling, the attacker may only have an educated guessing window of size nw for each potential...
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on Sponge construction and it provides a new MAC function called MAC-Keccak. These new algorithms have raised questions with regards to side-channel leakage and analysis attacks of MAC-Keccak. So far there exists prior work on attacks of software implementations of MAC-Keccak, but there has been no comprehensive...
A protection circuit can be added into cryptographic systems to detect both soft errors and injected faults required by Differential Fault Analysis (DFA) attacks. While such protection can improve the reliability of the target devices significantly and counteract DFA, they will also incur extra power consumption and other resource overhead. In this paper, we analyze the side-channel power leakage...
This paper discusses the cost functions of the three multicast schemes Bi-directional Tunneling, Remote Subscription and Agent Based. To developed from a probability model of engagement between any mobile network nodes in multicast group to a home agent. So the performance parameters required taken under continuous session duration constraints, taken in account the effects of nesting topology of Network...
Incorporating knowledge from domain expert to a classifier is one of the techniques which require to be considered in solving imbalanced dataset problems. In this study, the proposed technique is a development to extend the process for imbalanced dataset where the individual classification system has already been designed for balanced data set. This paper introduces a methodology and preliminary results...
Bluetooth, as the most popular end user choice of wireless connection, have its own security issues till now. In this paper, we introduce the proof-of-concept of BTFriend, the only Bluetooth Security Alert System designed for end users. We also discuss the development of first version BTFriend's prototype including the creation of Bluetooth device threat classification database and the usage of vNote...
Using terahertz near field time-domain spectroscopy (THz-TDS), we image subwavelength, cylindrical waveguides (d = 150 mum) loaded with a dielectric material that has a resonance. Time- and frequency-domain near-field images of the individual electric field components are measured as the THz light emerges from the waveguides.
Broadband THZ near-field measurements were performed on different types of antennas and single elements of a metamaterial structure, all having sub-wavelength dimensions. The time and frequency dependence of the electric near-field are presented and compared with numerical calculations. Effects of the substrate are discussed.
We investigate surface wave generation by a single slit, both in nano-optical and in terahertz regimes. The wave-front in optical regime separates itself into forward propagating wave and surface-bound 90-degree diffracted wave; while, no such clear separation of modes is not observed in terahertz regime. Excitation wavelength dependency is systematically studied.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.