Recently autonomous and semi-autonomous Unmanned Aerial Vehicle (UAV) sw...
In this paper we discuss the difficulties of mounting successful attack
...
This paper shows how the Xtensa architecture can be attacked with
Return...
Jamming is a form of the Denial of Service (J-DoS) attack. It is a
signi...
Octopus is an invertebrate belonging to the class of Cephalopoda. The bo...
In this paper we analyse the impact of different compile options on the
...
Due to the nature of applications such as critical infrastructure and th...
Side-channel analysis attacks, especially horizontal DPA and DEMA attack...
In this paper we describe our flexible ECDSA design for elliptic curve o...
Evaluation of the resistance of implemented cryptographic algorithms aga...
Side Channel Analysis attacks take advantage of the information leaked f...
In this paper we report on the results of selected horizontal SCA attack...
This paper reports about the impact of compiler options on the resistanc...
In this paper we introduce a unified field multiplier for the EC kP oper...
In this work we discuss the resistance of atomic pattern algorithms for
...
If devices are physically accessible optical fault injection attacks pos...
Resilience is a feature that is gaining more and more attention in compu...
Physically accessible devices such as sensor nodes in Wireless Sensor
Ne...
Resistive Random Access Memory (RRAM) is a type of Non-Volatile Memory (...
The IoT consists of a lot of devices such as embedded systems, wireless
...
The recent trends for nanoelectronic computing systems include
machine-t...