Results 181 to 190 of about 336,808 (204)
Some of the next articles are maybe not open access.
Timing Leakage Analysis of Non-constant-time NTT Implementations with Harvey Butterflies
2022Nir Drucker, Tomer Pelleg
openaire +1 more source
In this paper, timing side-channel attack (TSCA) and the weaknesses of the constant-time (CT) programming as a protection mechanism are reviewed based on the literature. It follows the development of timing attacks over the years, starting with primitive algorithmic leakages (RSA, Diffie-Hellman) to cache-based attacks on AES, to microarchitectural ...
openaire +1 more source
openaire +1 more source
An Optimised Constant-Time Implementation of KASUMI FI Function
2024 35th Irish Signals and Systems Conference (ISSC)Emma Urquhart, Desmond Chambers
openaire +1 more source
2023 12th Mediterranean Conference on Embedded Computing (MECO), 2023
Alkistis Aikaterini Sigourou +4 more
openaire +1 more source
Alkistis Aikaterini Sigourou +4 more
openaire +1 more source
Comparing implementations of global and local indicators of spatial association
Test, 2018Roger S Bivand, David W S Wong
exaly
Review of Fast Algorithms and Hardware Implementations on Computer Holography
IEEE Transactions on Industrial Informatics, 2016Tomoyoshi Shimobaba, Takashi Kakue
exaly

