|
|
|
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon...
ver más
|
|
|
|
|
|
|
Leonid Tymchenko,Vladimir Tverdomed,Nikolay Petrovsky,Natalya Kokryatskaya,Yurii Maistrenko
Pág. 21 - 27
A method for processing images of spots of laser beams is presented for systems using a modern and promising form of communication using atmospheric-optical communication lines (AOCL). The method allows to significantly expand the use of laser technology...
ver más
|
|
|
|
|
|
|
Krzysztof Golofit and Piotr Z. Wieczorek
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ...
ver más
|
|
|
|