Search

Your search keyword '"Side-Channel Attacks"' showing total 914 results

Search Constraints

Start Over You searched for: Descriptor "Side-Channel Attacks" Remove constraint Descriptor: "Side-Channel Attacks" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
914 results on '"Side-Channel Attacks"'

Search Results

1. Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled.

2. A systematic study of data augmentation for protected AES implementations.

3. ПОДХОД ЗА ОТКРИВАНЕ НА ПРОПУСКИ В СИГУРНОСТТА НА УЕББРАУЗЪРИ В ОПЕРАЦИОННИ СИСТЕМИ ЗА МОБИЛНИ УСТРОЙСТВА.

4. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments.

5. Kibernetski napadi preko stranskih kanalov.

6. Prover - Toward More Efficient Formal Verification of Masking in Probing Model

7. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

8. Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

9. PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels

10. OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

11. Power Consumption Modelling for Symmetric Block Encryption Algorithms

12. Raccoon: A Masking-Friendly Signature Proven in the Probing Model

15. Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks

17. Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification

18. Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks

19. Software Mitigation of RISC-V Spectre Attacks

20. Everlasting ROBOT: The Marvin Attack

21. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

22. On the Masking-Friendly Designs for Post-quantum Cryptography

23. Electromagnetic Fault Injection Attack on ASCON Using ChipShouter

25. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

26. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.

27. Differential fault attack on SPN-based sponge and SIV-like AE schemes.

28. Energy efficient triple-modular exponential techniques for batch verification schemes.

29. Leaking secrets in homomorphic encryption with side-channel attacks.

30. Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3

31. On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings

32. Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs

33. Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection

34. Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

35. Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

37. Lattice attacks on pairing-based signatures.

38. Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.

39. Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results.

40. Improving the performance of authentication protocols using efficient modular multi exponential technique.

41. Single-trace template attacks on permutation-based cryptography

42. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response

43. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments

45. DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator

Catalog

Books, media, physical & digital resources