Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
The Levene test based-leakage assessment
Integration, the VLSI Journal (INTG), Volume 87, Issue CPages 182–193https://doi.org/10.1016/j.vlsi.2022.06.013AbstractThe secret information is split into several parts(multivariate) in the high-order mask. The test vector leakage assessment (TVLA) relied on Welch's t-test(T-test), the analysis of variance (ANOVA) and normalized inter-class variance (NICV) ...
Highlights- a new method that quickly and reliably evaluate the security of IT products.
- The Levene test used to in leakage assessment of side channel in high order mask.
- Compared with the original detection method, the new method can reduce ...
- research-articleJune 2021
Directed graph mapping exceeds phase mapping in discriminating true and false rotors detected with a basket catheter in a complex in-silico excitation pattern
Computers in Biology and Medicine (CBIM), Volume 133, Issue Chttps://doi.org/10.1016/j.compbiomed.2021.104381AbstractAtrial fibrillation (AF) is the most frequently encountered arrhythmia in clinical practise. One of the major problems in the management of AF is the difficulty in identifying the arrhythmia sources from clinical recordings. That difficulty ...
Highlights- Application of PM on a basket catheter results in the detection of true as well as false rotors. These are indistinguishable.
- PM has only a single outcome whilst DGM can be tuned and parameters can be varied.
- Variation of the ...
- research-articleMay 2021
Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons
- Syed Wasif Abbas Hamdani,
- Haider Abbas,
- Abdul Rehman Janjua,
- Waleed Bin Shahid,
- Muhammad Faisal Amjad,
- Jahanzaib Malik,
- Malik Hamza Murtaza,
- Mohammed Atiquzzaman,
- Abdul Waheed Khan
ACM Computing Surveys (CSUR), Volume 54, Issue 3Article No.: 57, Pages 1–36https://doi.org/10.1145/3442480Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-...
- ArticleFebruary 2020
Extending NIST’s CAVP Testing of Cryptographic Hash Function Implementations
AbstractThis paper describes a vulnerability in Apple’s CoreCrypto library, which affects 11 out of the 12 implemented hash functions: every implemented hash function except MD2 (Message Digest 2), as well as several higher-level operations such as the ...
- research-articleOctober 2019
Count Your Toggles: a New Leakage Model for Pre-Silicon Power Analysis of Crypto Designs
Journal of Electronic Testing: Theory and Applications (JELT), Volume 35, Issue 5Pages 605–619https://doi.org/10.1007/s10836-019-05826-8AbstractPower analysis attack is a form of side channel attack which can recover the key of a cryptographic algorithm running on some device. In this work we propose CAD based methodology to perform power analysis on pre-silicon gate-level netlist of ...