Recently autonomous and semi-autonomous Unmanned Aerial Vehicle (UAV) sw...
In this paper we discuss the difficulties of mounting successful attack
...
Jamming is a form of the Denial of Service (J-DoS) attack. It is a
signi...
Octopus is an invertebrate belonging to the class of Cephalopoda. The bo...
In this paper we analyse the impact of different compile options on the
...
Due to the nature of applications such as critical infrastructure and th...
Side-channel analysis attacks, especially horizontal DPA and DEMA attack...
In this paper we describe our flexible ECDSA design for elliptic curve o...
Evaluation of the resistance of implemented cryptographic algorithms aga...
Side Channel Analysis attacks take advantage of the information leaked f...
In this paper we report on the results of selected horizontal SCA attack...
This paper reports about the impact of compiler options on the resistanc...
In this paper we introduce a unified field multiplier for the EC kP oper...
In this work we discuss the resistance of atomic pattern algorithms for
...
If devices are physically accessible optical fault injection attacks pos...
Physically accessible devices such as sensor nodes in Wireless Sensor
Ne...
Resistive Random Access Memory (RRAM) is a type of Non-Volatile Memory (...
The IoT consists of a lot of devices such as embedded systems, wireless
...
Machine Learning (ML) and Artificial Intelligence (AI) have a dependency...
The recent trends for nanoelectronic computing systems include
machine-t...