Cryptographic algorithms implemented in embedded devices must withstand Side Channel Attacks such as the Differential Power Analysis (DPA). A common method of protecting symmetric ...
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
In ACISP 2006, Peng et al proposed a novel range test technique, which tests whether the integer encrypted in a ciphertext is in an interval range. Their solution is more efficien...
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
We present the design and a prototype of a lab course on computer security, the necessity of which arises from the students' need to complement course work by hands-on experi...