The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
Abstract. At Crypto ’88, Matsumoto, Kato and Imai proposed a protocol, known as RSA-S1, in which a smart card computes an RSA signature, with the help of an untrusted powerful se...
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...