Search

Your search keyword '"SCA"' showing total 72 results

Search Constraints

Start Over You searched for: Descriptor "SCA" Remove constraint Descriptor: "SCA" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
72 results on '"SCA"'

Search Results

1. Selection of Aircraft with a Multimethodological Focus: a Combined Use of the Problem Structuring Method Strategic Choice Approach (SCA) and the Multicriteria Method MPSI-MARA

3. An Improved YOLOv8 Algorithm Model for Detection of Personal Protective Products in Chemical Plants

4. EFFLUX-F2: A High Performance Hardware Security Evaluation Board

5. Coordinated Design of Damping Controllers for Power System Stability

6. Sustainable of Supply Chain Through Smart Technology in Indonesian Retail MSMEs

8. Stacked Ensemble Models Evaluation on DL Based SCA

10. Hybrid Optimization Approach for Adaptive Beamforming in Smart Antenna System

11. The Optimal Layer of User-Specific Reconfigurable Intelligent Surfaces Structure for Uplink Communication System

12. Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis

14. Deep Learning Techniques for Side-Channel Analysis on AES Datasets Collected from Hardware and Software Platforms

17. Size, Speed, and Security: An Ed25519 Case Study

19. Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes

21. Real-Time Sickle Cell Anemia Diagnosis Based Hardware Accelerator

22. Blind Source Separation Technique for Operational Modal Analysis in Presence of Harmonic Excitation

24. Sine Cosine Optimization Based Proportional Derivative-Proportional Integral Derivative Controller for Frequency Control of Hybrid Power System

25. Side Channel Information Set Decoding Using Iterative Chunking : Plaintext Recovery from the 'Classic McEliece' Hardware Reference Implementation

26. Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics

27. When Similarities Among Devices are Taken for Granted: Another Look at Portability

28. Optimized Threshold Implementations: Minimizing the Latency of Secure Cryptographic Accelerators

29. Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations : With an Illustration on AES

30. Feature Extraction of Rolling Bearing Incipient Fault Using an Improved SCA-Based UBSS Method

31. Short Paper: How to Attack PSD2 Internet Banking

32. Speed-up of SCA Attacks on 32-bit Multiplications

33. Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks

35. Several Masked Implementations of the Boyar-Peralta AES S-Box

36. Mind the Gap: Towards Secure 1st-Order Masking in Software

37. Bitsliced Masking and ARM: Friends or Foes?

44. Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme

49. Finding the AES Bits in the Haystack: Reverse Engineering and SCA Using Voltage Contrast

50. SCA Resistance Analysis on FPGA Implementations of Sponge Based

Catalog

Books, media, physical & digital resources