Results 261 to 270 of about 5,942,634 (324)

Secure quantum key distribution against correlated leakage source. [PDF]

open access: yesSci Adv
Li JX   +9 more
europepmc   +1 more source

Energy loss evaluation in a side channel pump under different wrapping angles using entropy production method

International Communications in Heat and Mass Transfer, 2020
Flow losses in common vanned pumps such as centrifugal pumps have been widely studied, while less research attention has been paid to side channel pumps that are commonly used in the food processing and petrochemical industries.
Fan Zhang   +2 more
exaly   +2 more sources

Lightweight Ciphers and Their Side-Channel Resilience

IEEE Transactions on Computers, 2020
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, side-channel analysis for lightweight ciphers is much less investigated than for instance for AES.
Annelie Heuser   +2 more
exaly   +2 more sources

Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86

IEEE Micro, 2023
Power side-channel attacks exploit data-dependent variations in a CPU’s power consumption to leak secrets. In this article, we show that on modern CPUs, power side-channel attacks can be turned into timing attacks that can be mounted without access to ...
Yingchen Wang   +5 more
semanticscholar   +1 more source

Side channel

Proceedings of the sixteenth annual international conference on Mobile computing and networking, 2010
Interference is a critical issue in wireless communications. In a typical multiple-user environment, different users may severely interfere with each other. Coordination among users therefore is an indispensable part for interference management in wireless networks.
Wu, Kaishun   +5 more
openaire   +3 more sources

Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis

IEEE Transactions on Information Forensics and Security, 2021
Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and hyper-parameters ...
Yicheng Zhang   +4 more
semanticscholar   +1 more source

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

IEEE Conference on Virtual Reality and 3D User Interfaces, 2021
In Virtual Reality (VR), users typically interact with the virtual world using virtual keyboard to insert keywords, surfing the webpages, or typing passwords to access online accounts.
Abdullah Al Arafat   +2 more
semanticscholar   +1 more source

DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage

IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Neural Network (NN) accelerators are currently widely deployed in various security-crucial scenarios, including image recognition, natural language processing and autonomous vehicles.
Honggang Yu   +4 more
semanticscholar   +1 more source

I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis

IEEE Transactions on Emerging Topics in Computing
Today, the deep learning-based side-channel analysis represents a widely researched topic, with numerous results indicating the advantages of such an approach.
Lichao Wu, Guilherme Perin, S. Picek
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy