Learn More
The Montgomery ladder exponentiation algorithm is recognized as a very efficient countermeasure against Simple Power Analysis and C Safe-Error Attacks on RSA or elliptic curve cryptosystem. In this paper, we demonstrate the vulnerability of the Montgomery ladder algorithm to fault analysis attack when an error is injected during its operation in an embedded(More)
Delivery drones are unmanned aerial vehicles (UAV) utilized to transport packages, food, medicine, or other goods. With high demand for a prompt and efficient delivery, a drone delivery system can be an effective solution for timely deliveries and especially for emergency management. However, current delivery drone systems lack crucial security functions.(More)
A side channel analysis is a very efficient attack against small devices such as smart cards and wireless sensor nodes. In this paper, we propose an efficient key detection method using a peak selection algorithm in order to find the advanced encryption standard secret key from electromagnetic signals. The proposed method is applied to a correlation(More)
The conventional works on secret key distribution in the wireless sensor network have mainly focused on the application layer approaches. Recently, some researchers are studying the more efficient key distribution using the characteristics of lower layers such as network layer and physical layer. Oliveira and Barros proposed an approach to secret key(More)
  • 1