Search

Your search keyword '"Side-channel attacks"' showing total 107 results

Search Constraints

Start Over You searched for: Descriptor "Side-channel attacks" Remove constraint Descriptor: "Side-channel attacks" Publisher springer international publishing Remove constraint Publisher: springer international publishing
107 results on '"Side-channel attacks"'

Search Results

7. New Versions of Miller-loop Secured Against Side-Channel Attacks

13. HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments

15. On the Effectiveness of True Random Number Generators Implemented on FPGAs

17. Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering

18. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

19. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

20. Information-Set Decoding with Hints

23. Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability

24. Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks

25. Introduction

26. Memory Deduplication as a Protective Factor in Virtualized Systems

27. Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks

28. Increasing Side-Channel Resistance by Netlist Randomization and FPGA-Based Reconfiguration

29. Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel Analysis

30. From Practice to Theory: The 'Bright Illumination' Attack on Quantum Key Distribution Systems

31. Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel

32. A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM

34. Optimized and Secure Implementation of ROLLO-I

35. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?

36. A Comparison of -Test and Mutual Information as Distinguisher for Side-Channel Analysis

37. Remote Side-Channel Attacks on Heterogeneous SoC

38. Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage

39. Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery

40. Side-Channel Attacks on the Mobile Phones: Applicability and Improvements

41. More Practical Single-Trace Attacks on the Number Theoretic Transform

42. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults

43. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder

44. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations

45. Practical Algebraic Side-Channel Attacks Against ACORN

46. Attacking Noisy Secret CRT-RSA Exponents in Binary Method

47. Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge

49. Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel

50. T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks

Catalog

Books, media, physical & digital resources