Search

Your search keyword '"Side-channel attacks"' showing total 1,173 results

Search Constraints

Start Over You searched for: Descriptor "Side-channel attacks" Remove constraint Descriptor: "Side-channel attacks"
1,173 results on '"Side-channel attacks"'

Search Results

1. Differential Fault Attack on Ascon Cipher

2. Execution-Time Opacity Control for Timed Automata

6. Design of Deep Learning Methodology for Side-Channel Attack Detection Based on Power Leakages

7. Cracking the Core: Hardware Vulnerabilities in Android Devices Unveiled.

8. A systematic study of data augmentation for protected AES implementations.

9. ПОДХОД ЗА ОТКРИВАНЕ НА ПРОПУСКИ В СИГУРНОСТТА НА УЕББРАУЗЪРИ В ОПЕРАЦИОННИ СИСТЕМИ ЗА МОБИЛНИ УСТРОЙСТВА.

10. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments.

11. Kibernetski napadi preko stranskih kanalov.

12. Prover - Toward More Efficient Formal Verification of Masking in Probing Model

13. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

14. Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

15. PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels

16. OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

17. Power Consumption Modelling for Symmetric Block Encryption Algorithms

18. Raccoon: A Masking-Friendly Signature Proven in the Probing Model

21. Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-Based Side-Channel Attacks

23. Fault Attacks Sensitivity of Public Parameters in the Dilithium Verification

24. Deep Stacking Ensemble Learning Applied to Profiling Side-Channel Attacks

25. Software Mitigation of RISC-V Spectre Attacks

26. Everlasting ROBOT: The Marvin Attack

27. Deniable Cryptosystems: Simpler Constructions and Achieving Leakage Resilience

28. On the Masking-Friendly Designs for Post-quantum Cryptography

29. Electromagnetic Fault Injection Attack on ASCON Using ChipShouter

32. The Security Evaluation of an Efficient Lightweight AES Accelerator †.

33. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.

34. Differential fault attack on SPN-based sponge and SIV-like AE schemes.

35. Energy efficient triple-modular exponential techniques for batch verification schemes.

36. Leaking secrets in homomorphic encryption with side-channel attacks.

37. Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3

38. On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings

39. Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs

40. Securing Data From Side-Channel Attacks: A Graph Neural Network-Based Approach for Smartphone-Based Side Channel Attack Detection

41. Securing CPS Through Simultaneous Analog Side-Channel Monitoring of Cyber and Physical Domains

42. Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

44. Lattice attacks on pairing-based signatures.

45. Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.

46. Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results.

47. Improving the performance of authentication protocols using efficient modular multi exponential technique.

48. Single-trace template attacks on permutation-based cryptography

49. Mitigating Timing Side-Channel Attacks in Software-Defined Networks: Detection and Response

50. Enhanced Multi-Party Privacy-Preserving Record Linkage Using Trusted Execution Environments

Catalog

Books, media, physical & digital resources