Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
The problem of securing a network coding communication system against a wiretapper adversary is considered. The network implements linear network coding to deliver n packets from s...
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...