Search

Your search keyword '"Side-channel attacks"' showing total 44 results

Search Constraints

Start Over You searched for: Descriptor "Side-channel attacks" Remove constraint Descriptor: "Side-channel attacks" Journal ieee access Remove constraint Journal: ieee access
44 results on '"Side-channel attacks"'

Search Results

1. Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection

2. Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

3. Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

4. Fault Probability Correlation Analysis Based on Secondary Filtering

5. Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model

6. Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

7. CoDi$: Randomized Caches Through Confusion and Diffusion

8. HTB: A Very Effective Method to Protect Web Servers Against BREACH Attack to HTTPS

9. Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model

10. Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks

11. Multi-Leak Deep-Learning Side-Channel Analysis

12. Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks

13. Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders

14. UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks

15. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

16. Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure

17. Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective

18. Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method

19. A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

20. A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

21. Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack

22. Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction

23. A Modular and Optimized Toolbox for Side-Channel Analysis

24. Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

25. A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

26. Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures

27. Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property

28. Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

29. Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges

30. Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model

31. Exploiting the Back-Gate Biasing Technique as a Countermeasure Against Power Analysis Attacks

32. Exploring Cortex-M Microarchitectural Side Channel Information Leakage

33. Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack

34. A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

35. A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

36. Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method

37. Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures

38. A Modular and Optimized Toolbox for Side-Channel Analysis

39. Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

40. A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

41. Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3

42. Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction

43. Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model

44. Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges

Catalog

Books, media, physical & digital resources