Results 281 to 290 of about 1,839,896 (336)
Digital OTAs: Conventional Designs Versus Emerging Concept
Akbari M, Covi E, Gibertini P.
europepmc +1 more source
A novel Hankel norm approximation-based AGC for a hydro-dominated power system. [PDF]
Naqvi S +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Differential Power Analysis of CAST-128
2010 IEEE Computer Society Annual Symposium on VLSI, 2010Power analysis is used to reveal the secret key of security devices by monitoring the power consumption of certain cryptographic algorithm operations through a statistical analysis approach known as Differential Power Analysis (DPA). Whilst this has been applied extensively to attacks on FPGA devices, there has been little research into attacks on ASIC
Keanhong Boey +3 more
openaire +1 more source
Differential Power Analysis of XMSS and SPHINCS
2018Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature schemes are notable candidates for deployment. No rigorous side-channel analysis of hash-based signature schemes has been conducted so far.
Matthias J. Kannwischer +4 more
openaire +2 more sources
General scheme of differential power analysis
2013 36th International Conference on Telecommunications and Signal Processing (TSP), 2013Power analysis observes the power consumption of cryptographic device depending on its activity and following attack uses the measured power traces to determine some sensitive information to abuse the device. Differential power analysis attacks are the most popular because the attacker does not need detailed knowledge about the attacked device but on ...
Zdenek Martinasek +2 more
openaire +1 more source
Anatomy of Differential Power Analysis for AES
2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2008Side channel attacks are a significant threat to the deployment of secure embedded systems. Differential power analysis is one of the powerful power analysis attacks, which can be exploited in secure devices such as smart cards, PDAs and mobile phones. Several researchers in the past have presented experiments and countermeasures for differential power
Jude Angelo Ambrose +3 more
openaire +1 more source
Evolutionary ciphers against differential power analysis and differential fault analysis
Science China Information Sciences, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ming Tang 0002 +6 more
openaire +2 more sources

