A balanced secure cryptographic algorithm against timing and side channel attacks
Historically, a computing resource is scarce and expensive. In the last few decades, considerable efforts have been made to design efficient codes in terms of the storage space and running time. Due to the progress on computing resources and cost of memory, an efficient algorithm has ironically beco...
| Main Authors: | Abu, Nur Azman, Abd Ghafar, Amir Hamzah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/66493/ http://psasir.upm.edu.my/id/eprint/66493/1/Cryptology2014-7.pdf |
Similar Items
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015)
by: Abu, Nur Azman, et al.
Published: (2015)
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010)
by: Abdul-Latip, S. F., et al.
Published: (2010)
Adaptive chosen all inputs model for analyzing key derivation functions against bit-flip and timing side-channel attacks
by: Koh, Wen Wen
Published: (2019)
by: Koh, Wen Wen
Published: (2019)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Timing attack analysis on AAβ cryptosystem
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Cryptographic attack on Lucas based cryptosystems using chinese remainder theorem
by: Wong, Tze Jin, et al.
Published: (2019)
by: Wong, Tze Jin, et al.
Published: (2019)
Cryptographic attack on LUC-type cryptosystems using GMITM (Type 1)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
by: Sarbini, Izzatul Nabila, et al.
Published: (2019)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
Cross-VM Cache-based Side Channel Attacks and Proposed Prevention Mechanisms: A Survey
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Eavesdropping attacks on QKD channels
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
A robust security framework with bit-flipping attack and timing attack for key derivation functions
by: Wen Koh, Wen, et al.
Published: (2020)
by: Wen Koh, Wen, et al.
Published: (2020)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Performance of image watermarking algorithm using RSA with Fibonacci transform against attacks
by: Mahad, Zahari, et al.
Published: (2023)
by: Mahad, Zahari, et al.
Published: (2023)
Model and metaheuristics for robotic two-sided assembly line balancing problems with setup times
by: Li, Zixiang, et al.
Published: (2019)
by: Li, Zixiang, et al.
Published: (2019)
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
by: Abdulbari Ali, Sherif
Published: (2005)
by: Abdulbari Ali, Sherif
Published: (2005)
High Speed Computation Of Advanced Cryptographic Algorithms On Massively Parallel Architecture
by: Lee, Wai Kong
Published: (2018)
by: Lee, Wai Kong
Published: (2018)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Hybrid artificial bee colony algorithm with branch and bound for two–sided assembly line balancing
by: Elteriki, Salem Abdulsalam
Published: (2018)
by: Elteriki, Salem Abdulsalam
Published: (2018)
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2010)
by: Malekzadeh, Mina, et al.
Published: (2010)
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023)
by: Laghari, Shams Ul Arfeen
Published: (2023)
Improved moth flame optimization algorithm to optimize cost-oriented two-sided assembly line balancing
by: M. F. F., Ab Rashid, et al.
Published: (2019)
by: M. F. F., Ab Rashid, et al.
Published: (2019)
A new attack on special-structured RSA primes
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2019)
Conditions for counter measure against one time pad attack on Baptista type cryptosystem
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2009)
Similar Items
-
A secure cryptographic algorithm against side channel attacks
by: Abu, Nur Azman, et al.
Published: (2015) -
On the Security of NOEKEON against Side Channel Cube Attacks
by: Abdul-Latip, S. F., et al.
Published: (2010) -
Adaptive chosen all inputs model for analyzing key derivation functions against bit-flip and timing side-channel attacks
by: Koh, Wen Wen
Published: (2019) -
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000) -
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)