26 results on '"Side-channel attacks"'
Search Results
2. Execution-Time Opacity Control for Timed Automata
3. Information-Theoretic Bounds on the Evaluation of Attacks
4. Attacks on Unprotected Devices
5. Attacks on Protected Devices
6. Power Consumption Modelling for Symmetric Block Encryption Algorithms
7. Raccoon: A Masking-Friendly Signature Proven in the Probing Model
8. Side-Channel Analysis Attacks and Countermeasures
9. Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks
10. Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security
11. Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification
12. Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks
13. Software Mitigation of RISC-V Spectre Attacks
14. Everlasting ROBOT: The Marvin Attack
15. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience
16. On the Masking-Friendly Designs for Post-quantum Cryptography
17. Electromagnetic Fault Injection Attack on ASCON Using ChipShouter
18. DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator
19. A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
20. Simulation of Timing Attacks and Challenges for Early Side-Channel Security Analysis
21. MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V
22. Formal Verification of Arithmetic Masking in Hardware and Software
23. Punctured Syndrome Decoding Problem : Efficient Side-Channel Attacks Against Classic McEliece
24. Higher-Order Masking Scheme for Trivium Hardware Implementation
25. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
26. An Efficient Soft Analytical Side-Channel Attack on Ascon
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.