Cargando…
Fast Constant-Time Modular Inversion over [Formula: see text] Resistant to Simple Power Analysis Attacks for IoT Applications
The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the connected object domain. Finite fields play a crucial role in many public-key cryptographic algorithms (PKC...
Autores principales: | Sghaier, Anissa, Zeghid, Medien, Massoud, Chiraz, Ahmed, Hassan Yousif, Chehri, Abdellah, Machhout, Mohsen |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9002486/ https://www.ncbi.nlm.nih.gov/pubmed/35408148 http://dx.doi.org/10.3390/s22072535 |
Ejemplares similares
-
Two-Dimensional Permutation Vectors’ (PV) Code for Optical Code Division Multiple Access Systems
por: Yousif Ahmed, Hassan, et al.
Publicado: (2020) -
An IoT-enabled smart health care system for screening of COVID-19 with multi layers features fusion and selection
por: Ahmed, Imran, et al.
Publicado: (2022) -
Attacking IoT with Software defined radio
por: Andersson, Jonathan
Publicado: (2015) -
Attack Detection Using Network Coding in IoT Environment
por: Lee, Yong, et al.
Publicado: (2020) -
Botnet Attack Detection in IoT Using Machine Learning
por: Alissa, Khalid, et al.
Publicado: (2022)