Search

Your search keyword '"Side-Channel Attacks"' showing total 1,172 results

Search Constraints

Start Over You searched for: Descriptor "Side-Channel Attacks" Remove constraint Descriptor: "Side-Channel Attacks"
1,172 results on '"Side-Channel Attacks"'

Search Results

51. DNN Model Theft Through Trojan Side-Channel on Edge FPGA Accelerator

58. Simulation of Timing Attacks and Challenges for Early Side-Channel Security Analysis

59. MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V

60. Formal Verification of Arithmetic Masking in Hardware and Software

62. Punctured Syndrome Decoding Problem : Efficient Side-Channel Attacks Against Classic McEliece

63. Higher-Order Masking Scheme for Trivium Hardware Implementation

64. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation

66. New Versions of Miller-loop Secured Against Side-Channel Attacks

70. Multi-Dimensional Fusion Deep Learning for Side Channel Analysis.

71. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response †.

72. SoK: Deep Learning-based Physical Side-channel Analysis.

73. Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive Attacks.

74. The Side-channel Metrics Cheat Sheet.

75. The Security Evaluation of an Efficient Lightweight AES Accelerator

76. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

77. Quantile: Quantifying Information Leakage

78. Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks.

79. Efficient Nonprofiled Side-Channel Attack Using Multi-Output Classification Neural Network.

80. Efficient Exploitation of Noise Leakage for Template Attack.

81. Toward an Optimal Countermeasure for Cache Side-Channel Attacks.

82. Chosen ciphertext correlation power analysis on Kyber.

83. Survey and Taxonomy of Adversarial Reconnaissance Techniques.

84. Fault Probability Correlation Analysis Based on Secondary Filtering

85. Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model

86. Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

87. CoDi$: Randomized Caches Through Confusion and Diffusion

88. Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling.

91. An Efficient Soft Analytical Side-Channel Attack on Ascon

92. HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments

93. A Novel Clock Randomization Method Against Side-channel Attack

95. On the Effectiveness of True Random Number Generators Implemented on FPGAs

97. Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering

98. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber

99. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations

100. Information-Set Decoding with Hints

Catalog

Books, media, physical & digital resources