Results 311 to 320 of about 1,839,896 (336)
Novel countermeasures and techniques for differential power analysis. [PDF]
Research in the last few years has indicated that, despite modern algorithms being secure against all published mathematical attacks and being far too complex to break by brute force, secret key data can be gathered by monitoring the power consumption.
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A note on the differential spectrum of a class of power mappings with Niho exponent
Cryptography and Communications, 2022Haode Yan
exaly
Solving Power System Differential Algebraic Equations Using Differential Transformation
IEEE Transactions on Power Systems, 2020Yang Liu, Kai Sun
exaly
Hardware level countermeasures against differential power analysis. [PDF]
Hardware implementations of mathematically secure algorithms unintentionally leak side channel information, that can be used to attack the device. Such attacks, known as side channel attacks, are becoming an increasingly important aspect of designing security systems.
openaire +1 more source
Quasi-oppositional differential evolution for optimal reactive power dispatch
International Journal of Electrical Power and Energy Systems, 2016Mousumi Basu
exaly
A Systematic Method to Model Power Systems as Stochastic Differential Algebraic Equations
IEEE Transactions on Power Systems, 2013Federico Milano, Rafael Zarate-Minano
exaly
Differential Power Processing for DC Systems
IEEE Transactions on Power Electronics, 2013Pradeep S Shenoy, Philip T Krein
exaly
Differential properties of power functions
International Journal of Information and Coding Theory, 2010Celine Blondeau +2 more
exaly

