Search

Your search keyword '"Side-channel attacks"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "Side-channel attacks" Remove constraint Descriptor: "Side-channel attacks" Publisher springer nature switzerland Remove constraint Publisher: springer nature switzerland
26 results on '"Side-channel attacks"'

Search Results

1. Differential Fault Attack on Ascon Cipher

2. Execution-Time Opacity Control for Timed Automata

6. Power Consumption Modelling for Symmetric Block Encryption Algorithms

7. Raccoon: A Masking-Friendly Signature Proven in the Probing Model

9. Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks

11. Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification

12. Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks

13. Software Mitigation of RISC-V Spectre Attacks

14. Everlasting ROBOT: The Marvin Attack

15. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

16. On the Masking-Friendly Designs for Post-quantum Cryptography

17. Electromagnetic Fault Injection Attack on ASCON Using ChipShouter

18. DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator

20. Simulation of Timing Attacks and Challenges for Early Side-Channel Security Analysis

21. MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V

22. Formal Verification of Arithmetic Masking in Hardware and Software

23. Punctured Syndrome Decoding Problem : Efficient Side-Channel Attacks Against Classic McEliece

24. Higher-Order Masking Scheme for Trivium Hardware Implementation

25. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation

26. An Efficient Soft Analytical Side-Channel Attack on Ascon

Catalog

Books, media, physical & digital resources