RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Maximal overlap discrete wavelet transform-based power trace alignment algorithm against random delay countermeasure

        Saravanan Paramasivam,Srividhyaa Alamelu PL,Prashanth Sathyamoorthi 한국전자통신연구원 2022 ETRI Journal Vol.44 No.3

        Random delay countermeasures introduce random delays into the execution flow to break the synchronization and increase the complexity of the side channel attack. A novel method for attacking devices with random delay countermeasures has been proposed by using a maximal overlap discrete wavelet transform (MODWT)-based power trace alignment algorithm. Firstly, the random delay in the power traces is sensitized using MODWT to the captured power traces. Secondly, it is detected using the proposed random delay detection algorithm. Thirdly, random delays are removed by circular shifting in the wavelet domain, and finally, the power analysis attack is successfully mounted in the wavelet domain. Experimental validation of the proposed method with the National Institute of Standards and Technology certified Advanced Encryption Standard-128 cryptographic algorithm and the SAKURA-G platform showed a 7.5X reduction in measurements to disclosure and a 3.14X improvement in maximum correlation value when compared with similar works in the literature.

      • KCI등재

        Prevalence of peste des petits ruminants among sheep and goats in India

        Vinayagamurthy Balamurugan,Paramasivam Saravanan,Arnab Sen,Kaushal Kishor Rajak,Gnanavel Venkatesan,Paramanandham Krishnamoorthy,Veerakyathappa Bhanuprakash,Raj Kumar Singh 대한수의학회 2012 JOURNAL OF VETERINARY SCIENCE Vol.13 No.3

        This study measured the clinical prevalence of peste des petits ruminants (PPR) among sheep and goats in India between 2003 and 2009 by analyzing clinical samples from suspected cases of PPR that were submitted to the Rinderpest and Allied Disease Laboratory, Division of Virology, IVRI, Mukteswar for PPR diagnosis. PPR outbreaks were confirmed by detecting PPR virus (PPRV)-specific antigen in the clinical samples. Clinical samples (blood, nasal swabs, spleen, lymph node, kidney, liver, intestine, and pooled tissue materials) were taken from a total of 592 sheep and 912 goats in different states of India and screened for the presence of PPRV antigen using a monoclonal antibodybased sandwich ELISA kit. A total of 20, 38, and 11laboratory-confirmed PPR outbreaks occurred among sheep, goat, and combined sheep and goat populations, respectively. Our findings provide evidence of widespread PPR endemicity in India. The underlying reasons could be variations in husbandry practices in different geographical regions, agro-climatic conditions, and livestock migration. Furthermore, decrease in the number of PPR outbreaks over time might be due to the effectiveness of current live PPR vaccines and timely vaccination of target species. Vaccination against PPR has been practiced in India since 2002 to control this disease.

      • SCISCIESCOPUSKCI등재

        Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

        Shanmugham, Shanthi Rekha,Paramasivam, Saravanan Electronics and Telecommunications Research Instit 2021 ETRI Journal Vol.43 No.4

        Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼