Results 11 to 20 of about 1,445,629 (248)
Side-channel analysis of SEcube™ platform
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo+3 more
openaire +3 more sources
Hardware Implementation and Side-Channel Analysis of Lapin [PDF]
Lapin is a new authentication protocol that has been de- signed for low-cost implementations. In a work from RFIDsec 2012, Berstein and Lange argued that at similar (mathematical) security lev- els, Lapin's performances are below the ones of block cipher based au- thentication. In this paper, we suggest that as soon as physical security (e.g.
Gaspar, Lubos+3 more
openaire +4 more sources
Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt+76 more
core +2 more sources
Weakly Profiling Side-channel Analysis [PDF]
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofiling attacks eschew these requirements by trying all key guesses.
Wu, L., Perin, G., Picek, S.
openaire +2 more sources
Two-stage Channel Frequency Response Estimation in OFDM Systems [PDF]
This paper proposes two-stage channel frequency response estimation algorithm in communication systems with OFDM technology. Algorithm is based on Kalman filter. Pilots from current and previous OFDM symbols are used for channel estimation.
Myronchuk, Oleksandr+2 more
core +2 more sources
Spatial patterns in macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain [PDF]
We examined the spatial structure of macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain. The floodplain main-channel responded longitudinally to changes in hydrology with evident coarse-scale zones of upwelling ...
Doering, Michael, Robinson, Christopher
core +1 more source
It Started with Templates: The Future of Profiling in Side-Channel Analysis [PDF]
AbstractSide-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent years due to the fact that this type of attack defines the worst-case security assumptions.
Batina, Lejla+3 more
openaire +5 more sources
Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis [PDF]
Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power
Manich Bou, Salvador, Neagu, Madalin
core +2 more sources
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain+2 more
core
Venom peptides have shown promise in treating pain. Our study uses computer screening to identify a peptide that targets a sodium channel (NaV1.7) linked to chronic pain. We produced the peptide in the laboratory and refined its design, advancing the search for innovative pain therapies.
Gagan Sharma+8 more
wiley +1 more source