Search

Your search keyword '"Side-channel attacks"' showing total 32 results

Search Constraints

Start Over You searched for: Descriptor "Side-channel attacks" Remove constraint Descriptor: "Side-channel attacks" Publisher mdpi Remove constraint Publisher: mdpi
32 results on '"Side-channel attacks"'

Search Results

1. Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled.

2. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments.

3. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

4. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.

5. Multi-Dimensional Fusion Deep Learning for Side Channel Analysis.

6. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response †.

7. Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive Attacks.

8. Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses.

9. Application of Neural Networks to Power Analysis †.

10. Applying Address Encryption and Timing Noise to Enhance the Security of Caches.

11. A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges.

12. The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA.

13. Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack.

14. A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis.

15. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks.

16. Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture.

17. MATANA: A Reconfigurable Framework for Runtime Attack Detection Based on the Analysis of Microarchitectural Signals.

18. A Low-Overhead Countermeasure against Differential Power Analysis for AES Block Cipher.

19. Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism.

20. Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables.

21. Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor.

22. Chaos-Based Physical Unclonable Functions.

23. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

24. Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices.

25. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.

26. Design and Validation of Low-Power Secure and Dependable Elliptic Curve Cryptosystem.

27. EE-ACML: Energy-Efficient Adiabatic CMOS/MTJ Logic for CPA-Resistant IoT Devices †.

28. Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy.

29. Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †.

30. Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †.

31. A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.

32. Compiler optimizations as a countermeasure against side-channel analysis in MSP430-based devices.

Catalog

Books, media, physical & digital resources