Search

Your search keyword '"side-channel"' showing total 246 results

Search Constraints

Start Over You searched for: Descriptor "side-channel" Remove constraint Descriptor: "side-channel"
246 results on '"side-channel"'

Search Results

2. A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM.

3. Enhancing Security and Power Efficiency of Ascon Hardware Implementation with STT-MRAM.

4. Domain-Agnostic Representation of Side-Channels.

5. ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks

6. Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack

7. Secure Physical Design

8. High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA

9. Compress: Generate Small and Fast Masked Pipelined Circuits

10. Profiling Running Applications in Connected Devices Through Side-Channel and Machine Learning Techniques

11. Intrusion Detection for IoT Environments Through Side-Channel and Machine Learning Techniques

12. Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

13. Distribution of Signal to Noise Ratio and Application to Leakage Detection

14. Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis.

17. Simulation Based Hardware Trojan Detection Using Path Delay Analysis

18. SEV-Step A Single-Stepping Framework for AMD-SEV

19. Non-specific TVLA method based on two-sample KS test

20. Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study

21. Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components.

22. JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

23. 基于双样本 KS 检验的非特定 TVLA 方法.

24. Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis

25. Privacy-Aware Rejection Sampling.

26. An Efficiency–Accuracy Balanced Power Leakage Evaluation Framework Utilizing Principal Component Analysis and Test Vector Leakage Assessment.

27. Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks

29. A Hierarchical Approach for Multiple Periodicity Detection in Software Code Analysis

30. Fit the Joint Moments: How to Attack Any Masking Scheme

31. Don’t Learn What You Already Know

32. Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448

33. Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks

34. Low-Noise LLC Side-Channel Attack with Perf

35. A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks

36. The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks.

37. Power Analysis and Protection on SPECK and Its Application in IoT

38. Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks

39. Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)

40. Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.

41. A time and place for everything: Side-Channel verification using Co-Simulation

42. On the design and implementation of secure network protocols

43. Countermeasures against Static Power Attacks

44. USB powered devices: A survey of side-channel threats and countermeasures

45. Side-Channel Based Intrusion Detection for Industrial Control Systems

46. Recovering Memory Access Sequence with Differential Flush+Reload Attack

47. SCATTER: A New Dimension in Side-Channel

48. Masking the GLP Lattice-Based Signature Scheme at Any Order

49. Secure Realization of Lightweight Block Cipher: A Case Study Using GIFT

50. Tight Private Circuits: Achieving Probing Security with the Least Refreshing

Catalog

Books, media, physical & digital resources