Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
5G technology and IoT devices are improving efficiency and quality of life across many sectors. IoT devices are often used in open environments where they handle sensitive data. This makes them vulnerable to side-channel attacks (SCAs), where attackers can intercept and analyze the electromagnetic s...
| Published in: | Future Internet |
|---|---|
| Main Authors: | Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, Kuo-Yu Tsai |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-01-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/1999-5903/17/1/43 |
Similar Items
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method
by: Parthasarathy Ramadass, et al.
Published: (2024-09-01)
by: Parthasarathy Ramadass, et al.
Published: (2024-09-01)
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
Developed Protocol for Key Exchange Based on Irreducible Polynomial
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
SIDH Hybrid Schemes with Classical Component Based on the Discrete Logarithm Problem over Finite Field Extension
by: Michał Wroński, et al.
Published: (2020-09-01)
by: Michał Wroński, et al.
Published: (2020-09-01)
Triple receiver public key encryption cryptosystem
by: Liutao ZHAO, et al.
Published: (2020-12-01)
by: Liutao ZHAO, et al.
Published: (2020-12-01)
Triple receiver public key encryption cryptosystem
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01)
by: Shatha habeeb Jafar
Published: (2011-04-01)
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS
by: O Sri Nagesh, et al.
Published: (2020-06-01)
by: O Sri Nagesh, et al.
Published: (2020-06-01)
Smart grid environment using block chain-based key agreements
by: Wei Liu, et al.
Published: (2024-02-01)
by: Wei Liu, et al.
Published: (2024-02-01)
ADDING PERFECT FORWARD SECRECY TO KERBEROS
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Huifang JI, et al.
Published: (2020-04-01)
by: Huifang JI, et al.
Published: (2020-04-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Huifang JI, et al.
Published: (2020-04-01)
by: Huifang JI, et al.
Published: (2020-04-01)
A METHOD FOR OBTAINING SECURE AND EFFICIENT GROUP KEY OVER WIRELESS AD-HOC NETWORKS BASED ON A VIRTUAL SUBNET MODEL
by: PJ A Alphonse, et al.
Published: (2021-03-01)
by: PJ A Alphonse, et al.
Published: (2021-03-01)
Review of Chosen Isogeny-Based Cryptographic Schemes
by: Bartosz Drzazga, et al.
Published: (2022-05-01)
by: Bartosz Drzazga, et al.
Published: (2022-05-01)
Chip Design of Multithreaded and Pipelined RISC-V Microcontroller Unit
by: Mao-Hsu Yen, et al.
Published: (2025-02-01)
by: Mao-Hsu Yen, et al.
Published: (2025-02-01)
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
by: Junling Guo, et al.
Published: (2022-06-01)
by: Junling Guo, et al.
Published: (2022-06-01)
L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things
by: Manisha Malik, et al.
Published: (2023-01-01)
by: Manisha Malik, et al.
Published: (2023-01-01)
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
by: Johann Heyszl, et al.
Published: (2020-06-01)
by: Johann Heyszl, et al.
Published: (2020-06-01)
LIKA: Lightweight Identity Based Key Agreement Protocol for Secure Data Transmission in Advanced Metering Infrastructure of Smart Grid
by: Md Mehedi Hasan, et al.
Published: (2022-10-01)
by: Md Mehedi Hasan, et al.
Published: (2022-10-01)
New Counterexamples to Sequential Composition Adaptive Insecurity
by: Liqing Yu
Published: (2025-01-01)
by: Liqing Yu
Published: (2025-01-01)
Identity-based ring signature scheme under standard model
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
Identity-based ring signature scheme under standard model
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
by: ZHANG Yue-yu, et al.
Published: (2008-01-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
A chaotic digital signature algorithm based on a dynamic substitution box
by: Rolando Flores-Carapia, et al.
Published: (2025-01-01)
by: Rolando Flores-Carapia, et al.
Published: (2025-01-01)
Hybrid Algorithms Use Monomials in Encryption
by: Awni M. Gaftan, et al.
Published: (2020-03-01)
by: Awni M. Gaftan, et al.
Published: (2020-03-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission
by: Yiqin Bao, et al.
Published: (2024-01-01)
by: Yiqin Bao, et al.
Published: (2024-01-01)
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
by: Sedat Akleylek, et al.
Published: (2023-06-01)
by: Sedat Akleylek, et al.
Published: (2023-06-01)
Hybrid cloud storage system with enhanced multilayer cryptosystem for secure deduplication in cloud
by: Nagappan Mageshkumar, et al.
Published: (2023-01-01)
by: Nagappan Mageshkumar, et al.
Published: (2023-01-01)
Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
A Method for DDoS Attacks Prevention Using SDN and NFV
by: Mohammad Javad Shayegan, et al.
Published: (2024-01-01)
by: Mohammad Javad Shayegan, et al.
Published: (2024-01-01)
Similar Items
-
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01) -
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01) -
BSDN-HMTD: A blockchain supported SDN framework for detecting DDoS attacks using deep learning method
by: Parthasarathy Ramadass, et al.
Published: (2024-09-01) -
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01) -
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
