Search

Your search keyword '"Power Analysis"' showing total 698 results

Search Constraints

Start Over You searched for: Descriptor "Power Analysis" Remove constraint Descriptor: "Power Analysis" Topic computer Remove constraint Topic: computer
698 results on '"Power Analysis"'

Search Results

1. 3-Phase Adiabatic Logic and its Sound SCA Evaluation

2. Hardware Countermeasures against Power Analysis Attacks: a Survey from Past to Present

3. Rapid Syntactic Adaptation in Self-Paced Reading: Detectable, but Only With Many Participants

4. A Systematic Design Methodology of Formally Proven Side-Channel-Resistant Cryptographic Hardware

5. Power Measurement-Based Vulnerability Assessment of IoT Medical Devices at Varying Countermeasures for Cybersecurity

6. Mean comparisons and power calculations to ensure reproducibility in preclinical drug discovery

7. Design of Reconfigurable FRM Channelizer using Resource Shared Non-maximally Decimated Masking Filters

8. Design and verification of improved CMERE against power analysis attacks

9. SSizer: Determining the Sample Sufficiency for Comparative Biological Study

10. SCA-Pitaya

11. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

12. Real-Time Detection of Power Analysis Attacks by Machine Learning of Power Supply Variations On-Chip

13. Prime-seq, efficient and powerful bulk RNA sequencing

14. Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM

15. Energy Performance Analysis and Modelling of LoRa Prototyping Boards

16. The integration of DFMA (Design for Manufacturing and Assembly) and Reverse Engineering (ER) Applied to a Landing Gear Redesign

17. SoK : Remote Power Analysis

18. MiSDEED: a synthetic multi-omics engine for microbiome power analysis and study design

19. IoT Device Battery Life: Go Slow for Fast Insights Into Challenging Conditions

20. Ensuring statistical reproducibility of ocean model simulations in the age of hybrid computing

21. Stealing Machine Learning Parameters via Side Channel Power Attacks

22. Towards Enhancing Power-Analysis Attack Resilience for Logic Locking Techniques

23. A Chaos-Based Complex Micro-instruction Set for Mitigating Instruction Reverse Engineering

24. Statistical power of dynamic occupancy models to identify temporal change: Informing the North American Bat Monitoring Program

25. A randomised scheme for secured modular exponentiation against power analysis attacks

26. Applications of machine learning techniques in side-channel attacks: a survey

27. A new three-factor authentication and key agreement protocol for multi-server environment

29. Optimal Selection of the Structural Scheme of Compound Two-Carrier Planetary Gear Trains and Their Parameters

30. Design and analysis of secure emerging crypto-hardware using HyperFET devices

31. AREEBA: An Area Efficient Binary Huff-Curve Architecture

32. High Performance Advanced Encryption Standard system using Secure Double Rate Registers

33. i-AEGIS-128: An Improved Authenticated Encryption Based on AEGIS-128

34. Powerful sequential designs using Bayesian estimation: A power analysis tutorial using brms, the tidyverse, and furrr

35. Low Cost Heterogeneous ARIA S-Box Implementation for CPA-Resistance

36. Argus: Interactive A Priori Power Analysis

37. Making Obfuscated PUFs Secure Against Power Side-Channel Based Modeling Attacks

38. Stealthy Logic Misuse for Power Analysis Attacks in Multi-Tenant FPGAs

39. Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis

40. Selection of the Number of Participants in Intensive Longitudinal Studies: A User-Friendly Shiny App and Tutorial for Performing Power Analysis in Multilevel Regression Models That Account for Temporal Dependencies

41. Federated Learning in Side-Channel Analysis

42. MLP-Based Power Analysis Attacks with Two-Point Joint Feature Selection

43. Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES

44. Power Analysis Side-Channel Attacks on Symmetric Block Cipher Magma

45. SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis

46. Protecting the FPGA IPs against Higher-order Side Channel Attacks using Dynamic Partial Reconfiguration

47. Multiplier-free Realization of High Throughout Transpose Form FIR Filter

48. The Effects of Quantitative Trait Architecture on Detection Power in Short-Term Artificial Selection Experiments

49. Power Aware GALS Based Pipelined DES System

50. System Level Hardware Trojan Detection Using Side-Channel Power Analysis and Machine Learning

Catalog

Books, media, physical & digital resources