Browsing by Author "Kalkavan, Tugce"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Conference Object Dishonest node identification for key sharing systems through distributed key generation(IEEE Computer Society help@computer.org, 2013) Tugçe Kalkavan; Ahmet Hasan Koltuksuz; Kalkavan, Tugce; Koltuksuz, AhmetThe purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation each node has equal responsibility for creating distributed private key thus the identification of dishonest node becomes possible. With the identification of dishonest mode comes the recognition of legitimate and/or illegitimate parties as well. © 2013 IEEE. © 2014 Elsevier B.V. All rights reserved.Conference Object Spymasters Tools: A Comparative Approach to Side Channel Attacks(ACAD CONFERENCES LTD, 2014) Tugce Kalkavan; Kalkavan, Tugce; A Liaropoulos; G TsihrintzisIn many security protocols implementation of cryptographic algorithms can be thought as both software and hardware manner. The security of cryptographic algorithms is threatened by attacking cryptographic implementations. In public cryptography research on side channel attacks started with works of (Kocher et al. 2004 Kocher 1996 Kocher et al. 1999). Side channel attacks is a passive attack which basically depend on collecting information through physically observable phenomenon's created by the execution of computing tasks in microelectronic devices and logical gates in order to break cryptographic algorithms such as timing information proposed in (Kocher 1996 Jean-Fran et al. 2000) power consumption studied in (Kocher et al. 1999) and electromagnetic radiation in (Agrawal et al. 2003). This paper serves as an introduction to basic level of side channel attacks method and techniques used in these attacks and many other countermeasures such as Simple Power Analysis Differential Power Analysis, Data bit Differential Power Analysis against such attacks.

