Nothing Special   »   [go: up one dir, main page]

Nozaki et al., 2018 - Google Patents

Shuffling based side-channel countermeasure for energy harvester

Nozaki et al., 2018

Document ID
4823667031606680276
Author
Nozaki Y
Yoshikawa M
Publication year
Publication venue
2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)

External Links

Snippet

Energy harvesting technology has attracted attention to support internet of things (IoT) system. Also, in the viewpoint of security, encryption of energy harvesters used in IoT system is required. On the other hand, in recent years, side-channel analysis (SCA) revealing the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Similar Documents

Publication Publication Date Title
Choukri et al. Round reduction using faults
Breier et al. Laser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AES
Sundaresan et al. Secure tag search in RFID systems using mobile readers
Afifi et al. Dynamic authentication protocol using self-powered timers for passive Internet of Things
Jung et al. HRP: A HMAC-based RFID mutual authentication protocol using PUF
Batina et al. Hierarchical ECC-based RFID authentication protocol
Kaveh et al. A secure lightweight signcryption scheme for smart grid communications using reliable physically unclonable function
Nozaki et al. Shuffling based side-channel countermeasure for energy harvester
Mohammed et al. Web application authentication using ZKP and novel 6D chaotic system
Yin et al. Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education
Berlin et al. An overview of cryptanalysis of RSA public key system
Khan et al. A randomized switched-mode voltage regulation system for iot edge devices to defend against power analysis based side channel attacks
Cho et al. Hash-based RFID tag mutual authentication scheme with retrieval efficiency
Nozaki et al. Tamper resistance evaluation method for energy harvester
Lee et al. Wide–weak privacy–preserving RFID authentication protocols
Sharma et al. strade 2.0: Efficient mutual authentication scheme for energy trading in V2G using physically unclonable function
Ardiansyah et al. Hybrid cryptography for data security in wireless sensor network
Iqbal Dynamic access control in wireless sensor networks
Tavasoli et al. An efficient NSKDP authentication method to secure smart grid
Geng et al. On random dynamic voltage scaling for Internet-of-Things: A game-theoretic approach
Origines Jr et al. A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm
Shi et al. A CRC-based lightweight authentication protocol for EPCglobal Class-1 Gen-2 tags
Wang et al. A secure and efficient data transmission scheme for edge devices in smart grids
Hou et al. HB-MAP protocol: A new secure bidirectional light-wight authentication protocol of HB
Rizomiliotis HB− MAC: Improving the Random− HB# authentication protocol