1,172 results on '"Side-Channel Attacks"'
Search Results
52. EM Side-Channel Attack on AES
53. Power Analysis Attacks on AES
54. Laser Fault Injection Attack (FIA)
55. Voltage Glitch Attack on an FPGA AES Implementation
56. Clock Glitch Fault Attack on FSM in AES Controller
57. A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
58. Simulation of Timing Attacks and Challenges for Early Side-Channel Security Analysis
59. MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V
60. Formal Verification of Arithmetic Masking in Hardware and Software
61. Review of Smart Home Privacy-Protecting Strategies from a Wireless Eavesdropping Attack
62. Punctured Syndrome Decoding Problem : Efficient Side-Channel Attacks Against Classic McEliece
63. Higher-Order Masking Scheme for Trivium Hardware Implementation
64. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation
65. Literature Review of Security in Smart Home Network
66. New Versions of Miller-loop Secured Against Side-Channel Attacks
67. Defense against Security Threats with Regard to SoC Life Cycle
68. AI-Based Hardware Security Methods for Internet-of-Things Applications
69. Side-Channel Protection in Cryptographic Hardware
70. Multi-Dimensional Fusion Deep Learning for Side Channel Analysis.
71. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response †.
72. SoK: Deep Learning-based Physical Side-channel Analysis.
73. Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive Attacks.
74. The Side-channel Metrics Cheat Sheet.
75. The Security Evaluation of an Efficient Lightweight AES Accelerator
76. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
77. Quantile: Quantifying Information Leakage
78. Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks.
79. Efficient Nonprofiled Side-Channel Attack Using Multi-Output Classification Neural Network.
80. Efficient Exploitation of Noise Leakage for Template Attack.
81. Toward an Optimal Countermeasure for Cache Side-Channel Attacks.
82. Chosen ciphertext correlation power analysis on Kyber.
83. Survey and Taxonomy of Adversarial Reconnaissance Techniques.
84. Fault Probability Correlation Analysis Based on Secondary Filtering
85. Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model
86. Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme
87. CoDi$: Randomized Caches Through Confusion and Diffusion
88. Detecting Privacy Threats with Machine Learning: A Design Framework for Identifying Side-Channel Risks of Illegitimate User Profiling.
89. Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments
90. Towards Self-monitoring Enclaves: Side-Channel Detection Using Performance Counters
91. An Efficient Soft Analytical Side-Channel Attack on Ascon
92. HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments
93. A Novel Clock Randomization Method Against Side-channel Attack
94. A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures
95. On the Effectiveness of True Random Number Generators Implemented on FPGAs
96. Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies
97. Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering
98. Systematic Study of Decryption and Re-encryption Leakage: The Case of Kyber
99. Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations
100. Information-Set Decoding with Hints
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.