Results 181 to 190 of about 336,808 (204)
Some of the next articles are maybe not open access.

Evaluating the Security Boundaries of Constant-Time Implementations Against Timing Side-Channel Attacks

In this paper, timing side-channel attack (TSCA) and the weaknesses of the constant-time (CT) programming as a protection mechanism are reviewed based on the literature. It follows the development of timing attacks over the years, starting with primitive algorithmic leakages (RSA, Diffie-Hellman) to cache-based attacks on AES, to microarchitectural ...
openaire   +1 more source

A SSTDR Methodology, Implementations, and Challenges

Sensors, 2021
Samuel Kingston   +2 more
exaly  

An Optimised Constant-Time Implementation of KASUMI FI Function

2024 35th Irish Signals and Systems Conference (ISSC)
Emma Urquhart, Desmond Chambers
openaire   +1 more source

Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks

2023 12th Mediterranean Conference on Embedded Computing (MECO), 2023
Alkistis Aikaterini Sigourou   +4 more
openaire   +1 more source

Efficient methods for nonlinear time fractional diffusion-wave equations and their fast implementations

Numerical Algorithms, 2020
Jianfei Huang   +2 more
exaly  

Review of Fast Algorithms and Hardware Implementations on Computer Holography

IEEE Transactions on Industrial Informatics, 2016
Tomoyoshi Shimobaba, Takashi Kakue
exaly  

A Minute of Your Time

Ca-A Cancer Journal for Clinicians, 1983
exaly  

Home - About - Disclaimer - Privacy