107 results on '"Side-channel attacks"'
Search Results
2. Power Analysis Attacks on AES
3. Laser Fault Injection Attack (FIA)
4. Voltage Glitch Attack on an FPGA AES Implementation
5. Clock Glitch Fault Attack on FSM in AES Controller
6. Literature Review of Security in Smart Home Network
7. New Versions of Miller-loop Secured Against Side-Channel Attacks
8. Defense against Security Threats with Regard to SoC Life Cycle
9. AI-Based Hardware Security Methods for Internet-of-Things Applications
10. Side-Channel Protection in Cryptographic Hardware
11. Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments
12. Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
13. HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments
14. A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures
15. On the Effectiveness of True Random Number Generators Implemented on FPGAs
16. Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies
17. Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering
18. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
19. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
20. Information-Set Decoding with Hints
21. Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated Circuits
22. High-Level Synthesis for Minimizing Power Side-Channel Information Leakage
23. Diminisher: A Linux Kernel Based Countermeasure for TAA Vulnerability
24. Generalizing Statistical Ineffective Fault Attacks in the Spirit of Side-Channel Attacks
25. Introduction
26. Memory Deduplication as a Protective Factor in Virtualized Systems
27. Moving Target and Implementation Diversity Based Countermeasures Against Side-Channel Attacks
28. Increasing Side-Channel Resistance by Netlist Randomization and FPGA-Based Reconfiguration
29. Online Performance Evaluation of Deep Learning Networks for Profiled Side-Channel Analysis
30. From Practice to Theory: The 'Bright Illumination' Attack on Quantum Key Distribution Systems
31. Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side Channel
32. A Key-Recovery Timing Attack on Post-quantum Primitives Using the Fujisaki-Okamoto Transformation and Its Application on FrodoKEM
33. Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method
34. Optimized and Secure Implementation of ROLLO-I
35. Key Enumeration from the Adversarial Viewpoint : When to Stop Measuring and Start Enumerating?
36. A Comparison of -Test and Mutual Information as Distinguisher for Side-Channel Analysis
37. Remote Side-Channel Attacks on Heterogeneous SoC
38. Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage
39. Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
40. Side-Channel Attacks on the Mobile Phones: Applicability and Improvements
41. More Practical Single-Trace Attacks on the Number Theoretic Transform
42. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults
43. Fast Side-Channel Security Evaluation of ECC Implementations : Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
44. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations
45. Practical Algebraic Side-Channel Attacks Against ACORN
46. Attacking Noisy Secret CRT-RSA Exponents in Binary Method
47. Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge
48. Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa
49. Efficient Identification of Applications in Co-resident VMs via a Memory Side-Channel
50. T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.