Nozaki et al., 2018 - Google Patents
Shuffling based side-channel countermeasure for energy harvesterNozaki et al., 2018
- Document ID
- 4823667031606680276
- Author
- Nozaki Y
- Yoshikawa M
- Publication year
- Publication venue
- 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)
External Links
Snippet
Energy harvesting technology has attracted attention to support internet of things (IoT) system. Also, in the viewpoint of security, encryption of energy harvesters used in IoT system is required. On the other hand, in recent years, side-channel analysis (SCA) revealing the …
- 241001124569 Lycaenidae 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Choukri et al. | Round reduction using faults | |
Breier et al. | Laser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AES | |
Sundaresan et al. | Secure tag search in RFID systems using mobile readers | |
Afifi et al. | Dynamic authentication protocol using self-powered timers for passive Internet of Things | |
Jung et al. | HRP: A HMAC-based RFID mutual authentication protocol using PUF | |
Batina et al. | Hierarchical ECC-based RFID authentication protocol | |
Kaveh et al. | A secure lightweight signcryption scheme for smart grid communications using reliable physically unclonable function | |
Nozaki et al. | Shuffling based side-channel countermeasure for energy harvester | |
Mohammed et al. | Web application authentication using ZKP and novel 6D chaotic system | |
Yin et al. | Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education | |
Berlin et al. | An overview of cryptanalysis of RSA public key system | |
Khan et al. | A randomized switched-mode voltage regulation system for iot edge devices to defend against power analysis based side channel attacks | |
Cho et al. | Hash-based RFID tag mutual authentication scheme with retrieval efficiency | |
Nozaki et al. | Tamper resistance evaluation method for energy harvester | |
Lee et al. | Wide–weak privacy–preserving RFID authentication protocols | |
Sharma et al. | strade 2.0: Efficient mutual authentication scheme for energy trading in V2G using physically unclonable function | |
Ardiansyah et al. | Hybrid cryptography for data security in wireless sensor network | |
Iqbal | Dynamic access control in wireless sensor networks | |
Tavasoli et al. | An efficient NSKDP authentication method to secure smart grid | |
Geng et al. | On random dynamic voltage scaling for Internet-of-Things: A game-theoretic approach | |
Origines Jr et al. | A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm | |
Shi et al. | A CRC-based lightweight authentication protocol for EPCglobal Class-1 Gen-2 tags | |
Wang et al. | A secure and efficient data transmission scheme for edge devices in smart grids | |
Hou et al. | HB-MAP protocol: A new secure bidirectional light-wight authentication protocol of HB | |
Rizomiliotis | HB− MAC: Improving the Random− HB# authentication protocol |