Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of Side Channel Attack (SCA) which allows an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA).
The theoretical weaknesses in algorithms or leaked information from physical implementation of a cryptosystem are usually used to break the system. In this paper proved the weakness of PingPong-128 key stream generator which increased outputs key stream of specific non-linearity by adding mutual clock-control structure to previous summation generator through Correlation power analysis attack.
Continue Reading
We consider the connectedness in the game of Go. This game has a graph theoretical structure and the connectedness of the stones is very important to evaluate positions. In this…
In this paper, the method of fault detection and isolation for microreactor units actuated by Peltier devices is proposed. Modeling and operator-based right coprime factorization of the nonlinear microreactor process…
To assist drivers and prevent collisions, we propose a system called OmniView that extends driver's vision in all directions, using cameras of multiple collaborating smartphones in the surrounding vehicles. OmniView…
In this paper, we describe a web-based service that visualizes sensing data in an urban public space. The sensing data obtained from multiple sensor devices are visualized with three-dimensional graphical…
Requirement prioritization is a process that allows selection of the “key” candidate requirements, the ones that are the most important for the construction of quality and cost-controlled software. Requirement prioritization…
Senior citizens may suffer from a number of diseases, including but not limited to mild dementia and cognitive disabilities, which require either the institutionalization or the constant support from care-givers.…
FGAC model has been adopted by enterprise applications, for the protection of their databases. Most of these deployments are not only limited in purpose but are dependent upon various other…
In loop parallelization, data dependence relations are used to decide which pair of statement instances should be allocated to a same processor or should have a synchronization communication. However, in…
A parallelized generation of Zadoff-Chu (ZC) and the Discrete Fourier Transform of Zadoff-Chu (ZC-DFT) sequences is proposed. In this algorithm, the sampling operation is completely eliminated for the ZC-DFT sequences…