Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMarch 2024
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure
Information Security and Cryptology – ICISC 2023Pages 185–201https://doi.org/10.1007/978-981-97-1235-9_10AbstractCumulative Distribution Table (CDT) sampling is a Gaussian sampling technique commonly used for extracting secret coefficients or core matrix values in lattice-based Post-Quantum Cryptography (PQC) algorithms like FrodoKEM and FALCON. This paper ...
- review-articleOctober 2023
Computer-aided diagnostic system for hypertensive retinopathy: A review
Computer Methods and Programs in Biomedicine (CBIO), Volume 240, Issue Chttps://doi.org/10.1016/j.cmpb.2023.107627Highlights- The review presents the comprehensive evolution of Computer Aided Diagnosis (CAD) system for automatic diagnosis of Hypertensive Retinopathy (HR).
- Detailed analysis of the current research methodologies on conventional, machine ...
Hypertensive Retinopathy (HR) is a retinal disease caused by elevated blood pressure for a prolonged period. There are no obvious signs in the early stages of high blood pressure, but it affects various body parts over time, including the eyes. ...
- research-articleSeptember 2023
Intelligent hybrid energy system and grid integration using microcontrollers
Computers and Electrical Engineering (CENG), Volume 110, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.108873Highlights- Developed an intelligent hybrid energy system using hydrogen fuel cells and batteries.
- A microcontroller is used to control the developed hybrid energy system in an intelligent way.
- The developed system coordinates the power flow ...
This study uses a fuel cell system with backup batteries coupled to renewable energy sources with intelligent control. The system developed for this research is built on a battery bank for energy storage and a fuel cell stack for energy ...
Graphical abstractDisplay Omitted
- research-articleSeptember 2022
Power fluctuation mitigation strategy for microgrids based on an LSTM-based power forecasting method
AbstractWith the rapid penetration of renewable generation systems and active loads, the stability and reliability of modern power systems face several challenges owing to power fluctuations caused by renewable intermittency and load uncertainty. Power ...
Highlights- A proactive generator voltage control framework based on power fluctuation forecasting algorithm is first time proposed to change the generator output power in advance.
- An EMD-MHPSO-LSTM algorithm is proposed to forecast the power ...
- research-articleOctober 2021
Fractional order PID controller design for wind turbine systems using analytical and computational tuning approaches
Computers and Electrical Engineering (CENG), Volume 95, Issue Chttps://doi.org/10.1016/j.compeleceng.2021.107410Highlights- A recently proposed analytical fractional order PID controller design approach is applied to control the speed of a two-mass wind turbine system.
In this paper, a recently proposed analytical fractional order PID controller design approach is applied to control the speed of a two-mass wind turbine system. The wind turbine complex nonlinear system is commonly modeled as a two-...
Graphical abstractDisplay Omitted
-
- research-articleNovember 2021
Review on Embedded Systems and the Internet of Things: Comparative Study
NISS '21: Proceedings of the 4th International Conference on Networking, Information Systems & SecurityArticle No.: 60, Pages 1–7https://doi.org/10.1145/3454127.3457636Nowadays, thanks to the explosion of the Internet of Things or IoT, any object for public or industrial use can be connected to the Internet and become connected. Which requires companies to follow this explosion and to make improvements on their ...
- research-articleAugust 2020
AVRS: emulating AVR microcontrollers for reverse engineering and security testing
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 23, Pages 1–10https://doi.org/10.1145/3407023.3407065Embedded systems and microcontrollers are becoming more and more popular as the Internet of Things continues to spread. However, while there is a wealth of different methods and tools for analyzing software and firmware for architectures that are common ...
- research-articleSeptember 2019
A particle swarm optimization, fuzzy PID controller with generator automatic voltage regulator
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 23, Issue 18Pages 8839–8853https://doi.org/10.1007/s00500-018-3483-4AbstractThe role of an intelligent control system with a certain stage of autonomy is prerequisite for effective operation. We designed a particle swarm optimization, fuzzy proportional integral derivative (PSOFPID) controller using MATLAB for a set point ...
- research-articleFebruary 2018
Compact Implementations of ARX-Based Block Ciphers on IoT Processors
ACM Transactions on Embedded Computing Systems (TECS), Volume 17, Issue 3Article No.: 60, Pages 1–16https://doi.org/10.1145/3173455In this article, we present implementations for Addition, Rotation, and eXclusive-or (ARX)-based block ciphers, including LEA and HIGHT, on IoT devices, including 8-bit AVR, 16-bit MSP, 32-bit ARM, and 32-bit ARM-NEON processors. We optimized 32-/8-...
- ArticleJuly 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices
DIMVA 2016: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721Pages 58–77https://doi.org/10.1007/978-3-319-40667-1_4Code reuse attacks are advanced exploitation techniques that constitute a serious threat for modern systems. They profit from a control flow hijacking vulnerability to maliciously execute one or more pieces of code from the targeted application. ASLR ...
- articleDecember 2015
Optimized Karatsuba squaring on 8-bit AVR processors
Security and Communication Networks (SACN), Volume 8, Issue 18Pages 3546–3554https://doi.org/10.1002/sec.1279Multi-precision squaring is one of the performance-critical operations for implementation of elliptic curve cryptography. This paper continues the line of research on high-speed multi-precision squaring on embedded processors. In particular, we present ...
- ArticleOctober 2015
Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
SPACE 2015: Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering - Volume 9354Pages 289–309https://doi.org/10.1007/978-3-319-24126-5_17The AVR family of 8-bit microcontrollers is widely used in several applications demanding secure communications and protection against physical attacks, such as side-channel analysis. In this context, processing, storage and energy demands of ...
- ArticleAugust 2015
Compact Implementations of LSH
WISA 2015: Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503Pages 41–53https://doi.org/10.1007/978-3-319-31875-2_4In ICISC'14, a new hash function family named LSH was released. The algorithm is secure against all critical hash function attacks and has simple ARX architecture with multiple data sets, which are computed in same operation. This nice features are well ...
- ArticleAugust 2015
Compact Implementations of LEA Block Cipher for Low-End Microprocessors
WISA 2015: Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503Pages 28–40https://doi.org/10.1007/978-3-319-31875-2_3In WISA'13, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are ...
- articleApril 2015
Stability Enhancement in Multi-Machine Power Systems by Fuzzy-based Coordinated AVR-PSS
International Journal of Energy Optimization and Engineering (IJEOE), Volume 4, Issue 2Pages 36–50https://doi.org/10.4018/IJEOE.2015040103This paper presents performance of intelligent fuzzy-based coordinated control for Automatic Voltage Regulator AVR and Power System Stabilizer PSS, to prevent losing synchronism after major sudden faults and to achieve appropriate post-fault voltage ...
- ArticleSeptember 2014
Clock Glitch Attacks in the Presence of Heating
FDTC '14: Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in CryptographyPages 104–114https://doi.org/10.1109/FDTC.2014.20Fault attacks have been widely studied in the past but most of the literature describes only individual fault-injection techniques such as power/clock glitches, EM pulses, optical inductions, or heating/cooling. In this work, we investigate combined ...
- research-articleJanuary 2014
Group-signature schemes on constrained devices: the gap between theory and practice
CS2 '14: Proceedings of the First Workshop on Cryptography and Security in Computing SystemsPages 31–36https://doi.org/10.1145/2556315.2556321Group-signature schemes allow members within a predefined group to prove specific properties without revealing more information than necessary. Potential areas of application include electronic IDs (eIDs) and smartcards, i.e., resource-constrained ...
- ArticleJune 2014
The Temperature Side Channel and Heating Fault Attacks
Smart Card Research and Advanced ApplicationsPages 219–235https://doi.org/10.1007/978-3-319-08302-5_15AbstractIn this paper, we present practical results of data leakages of CMOS devices via the temperature side channel—a side channel that has been widely cited in literature but not well characterized yet. We investigate the leakage of processed data by ...
- ArticleApril 2013
Flag and Register Array Based High Performance Instruction Set Architecture of Embedded Processor
CSNT '13: Proceedings of the 2013 International Conference on Communication Systems and Network TechnologiesPages 716–720https://doi.org/10.1109/CSNT.2013.153Here, assumption is that if we add 8 numbers from register array then it takes 120ns when execution time is 5ns and register access time is 10ns. If we add same 8 number using one by one fetching from memory then it takes 840ns to add 8 numbers. In that ...
- ArticleJanuary 2013
Stability Improvement of Wind Power Integrated System Using PSS and SVC
ISDEA '13: Proceedings of the 2013 Third International Conference on Intelligent System Design and Engineering ApplicationsPages 1282–1286https://doi.org/10.1109/ISDEA.2012.302When a large amount of wind power being integrated into power system, will make system stability deterioration. At present these methods for improving stability are not very economical. This paper is aimed at solving the stability problem of multi-...