2021
DOI: 10.1016/j.jisa.2021.102861
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on cryptosystems implemented via VLSI: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 101 publications
0
5
0
Order By: Relevance
“…Chattopadhyay et al [121] explained that decoding application protocol messages, reverse-engineering security-critical parameters, or cryptanalysis of cryptograms are the typical ways for orchestrating cryptanalysis attacks. Sravani and Durai [122] surveyed cryptanalysis based strategies to attack crypto-devices using side-channel and hardware trojan techniques. Table X presents a synopsis of defenses against Cryptanalysis attacks.…”
Section: Defenses Against Cryptanalysis Attackmentioning
confidence: 99%
“…Chattopadhyay et al [121] explained that decoding application protocol messages, reverse-engineering security-critical parameters, or cryptanalysis of cryptograms are the typical ways for orchestrating cryptanalysis attacks. Sravani and Durai [122] surveyed cryptanalysis based strategies to attack crypto-devices using side-channel and hardware trojan techniques. Table X presents a synopsis of defenses against Cryptanalysis attacks.…”
Section: Defenses Against Cryptanalysis Attackmentioning
confidence: 99%
“…Chattopadhyay et al [186] explain that decoding application protocol messages, reverseengineering security-critical parameters, or cryptanalysis of cryptograms are the typical ways for orchestrating cryptanalysis attacks. Sravani and Durai [187] study cryptanalysisbased strategies to attack crypto-devices using side-channel and hardware trojan techniques. With reference to Table 21, Cryptanalysis attack can impact 02 04 05 06 07 18 20 -22 shown in Figure 5 and Table 37 presents a synopsis of defenses against Cryptanalysis attacks.…”
Section: ) Defenses Against Cryptanalysis Attackmentioning
confidence: 99%
“…Further, expecting the patients to keep medical records handy while visiting multiple hospitals for treatment might be futile. Moreover, preparing and maintaining hard copies of the patients' medical records might be unsafe and error-prone [9]. To overcome such mishaps, a system of digital medical record (DMR) has been developed by several countries to take care of the citizens' health.…”
Section: A Secure Access Schemes Of Digital Health Recordmentioning
confidence: 99%