Articles with "key leakage" as a keyword



Photo by hakannural from unsplash

Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4

Sign Up to like & get
recommendations!
Published in 2018 at "Electronics Letters"

DOI: 10.1049/el.2018.1153

Abstract: In the security system, there is a lot of sensitive information, and the leakage of the secret key will cause security failure. In this Letter, combining the fault injection analysis of SM4 (Chinese block cipher… read more here.

Keywords: key leakage; leakage; fault injection; block cipher ... See more keywords
Photo by chernus_tr from unsplash

An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3200405

Abstract: Cryptographic schemes are often deployed in microgrids to protect communication security. However, most existing schemes widely used in microgrids cannot ensure forward secrecy and non-repudiation under key leakage and dishonest insiders. Although some existing cryptographic… read more here.

Keywords: leakage dishonest; sensitive microgrid; dishonest insiders; key leakage ... See more keywords