Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:WISA (21. : 2020 : Online) Information security applications
1. Verfasser: Kwon, Hyeokdong (VerfasserIn)
Weitere Verfasser: Kim, Hyunji (VerfasserIn), Choi, Seung Ju (VerfasserIn), Jang, Kyoungbae (VerfasserIn), Park, Jaehoon (VerfasserIn), Kim, Hyunjun (VerfasserIn), Seo, Hwajeong (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
On the Cost-Effectiveness of TrustZone Defense on ARM Platform 2020 Liu, Naiwei
CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs 2020 Na, Dongbin
3-Party Adversarial Steganography 2020 Meraouche, Ishak
Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers 2020 Kwon, Hyeokdong
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers 2020 Jang, Kyoungbae
Accessibility Service Utilization Rates in Android Applications Shared on Twitter 2020 Ichioka, Shuichi
Toward a Fine-Grained Evaluation of the Pwnable CTF 2020 Kim, Sung-Kyung
Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis 2020 Lee, Chaeeun
Analysis on Malicious Residential Hosts Activities Exploited by Residential IP Proxy Services 2020 Hanzawa, Akihiro
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments 2020 Choi, Hojin
The Gravy Value: A Set of Features for Pinpointing BOT Detection Method 2020 Park, Semi
Virtualization Technologies in the Android Framework and Compatibility with SEAndroid 2020 Yoon, Jaehyeon
Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things 2020 Kim, Hyunji
Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification 2020 Shim, Hyunseok
Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-Channel 2020 Won, Yoo-Seung
Security Problems of 5G Voice Communication 2020 Park, Seongmin
Insights into Attacks’ Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks 2020 Abusnaina, Ahmed
Filtering-Based Correlation Power Analysis (CPA) with Signal Envelopes Against Shuffling Methods 2020 Jeon, Youngbae
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction 2020 Dutta, Priyanka
Revisiting the Minrank Problem on Multivariate Cryptography 2020 Wang, Yacheng
Alle Artikel auflisten