Prabu et al., 2010 - Google Patents
Fault Analysis Attacks and Its Countermeasure using Elliptic Curve CryptographyPrabu et al., 2010
View PDF- Document ID
- 10800832084209294280
- Author
- Prabu M
- Shanmugalakshmi R
- Publication year
- Publication venue
- International Journal of Computer Science & Information Security
External Links
Snippet
In the last decade, many researchers had published the overall analysis attacks of cryptographic devices against implementation on elliptic curve attacks. Usually such type of information is not sufficient to learn about the individual attacks. Now in this article, we …
- 238000004458 analytical method 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yan | Introduction to intelligent surveillance: surveillance data capture, transmission, and analytics | |
Denis et al. | Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems | |
Panah et al. | On the properties of non-media digital watermarking: a review of state of the art techniques | |
Yan et al. | A survey of quantum image representations | |
Gong et al. | Quantum image encryption algorithm based on quantum image XOR operations | |
Singh et al. | EiMOL: a secure medical image encryption algorithm based on optimization and the Lorenz system | |
Deshpande et al. | Security and data storage aspect in cloud computing | |
Hamza et al. | An efficient cryptosystem for video surveillance in the internet of things environment | |
Rahman et al. | Chaos-cryptography based privacy preservation technique for video surveillance | |
Chaganti et al. | Stegomalware: A systematic survey of MalwareHiding and detection in images, machine LearningModels and research challenges | |
Sheikh et al. | A survey on edge computing (EC) security challenges: Classification, threats, and mitigation strategies | |
Chang | [Retracted] Cryptospace invertible steganography with conditional generative adversarial networks | |
Liu et al. | A decentralized digital watermarking framework for secure and auditable video data in smart vehicular networks | |
Peng et al. | A survey of security protection methods for deep learning model | |
Liu et al. | Image processing method based on chaotic encryption and wavelet transform for planar design | |
Evsutin et al. | Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems | |
US11599605B1 (en) | System and method for dynamic data injection | |
Cao et al. | Using image sensor PUF as root of trust for birthmarking of perceptual image hash | |
Twenning et al. | Using perceptual hashing for targeted content scanning | |
Asghar et al. | Survey on Video Security: Examining Threats, Challenges, and Future Trends. | |
Biryukov | Feistel cipher | |
Dangwal et al. | Mitigating Reverse Engineering Attacks on Local Feature Descriptors. | |
Pramanik | A new method for locating data hiding in image steganography | |
Prabu et al. | Fault Analysis Attacks and Its Countermeasure using Elliptic Curve Cryptography | |
Zhang et al. | StegEraser: Defending cybersecurity against malicious covert communications |