Results 201 to 210 of about 1,445,629 (248)
Identification of druggable binding sites and small molecules as modulators of TMC1. [PDF]
De-la-Torre P+8 more
europepmc +1 more source
Airway smooth muscle--on-a-chip: a microfluidic approach to study alveolar smooth muscle remodelling
Suhail A+8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Abacus: Precise Side-Channel Analysis
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities. However, in practice, many such vulnerabilities leak a negligible amount of sensitive information, and thus developers are often reluctant to address them ...
Bao, Qinkun+4 more
openaire +3 more sources
Side channel analysis of SPECK
Journal of Computer Security, 2020SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
R. Balasubramanian+3 more
openaire +2 more sources
Use of Simulators for Side-Channel Analysis
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Sylvain Guilley, Nikita Veshchikov
openaire +2 more sources
Side channel analysis of an automotive microprocessor
IET Irish Signals and Systems Conference (ISSC 2008), 2008Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain information about the car and dictate how the car behaves.
Hamilton, Mark+3 more
openaire +2 more sources
Abacus: A Tool for Precise Side-Channel Analysis
2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2021Side-channel vulnerabilities can leak sensitive information unconsciously. In this paper, we introduce the usage of Abacus. Abacus is a tool that can analyze secret-dependent control-flow and secret-dependent data-access leakages in binary programs.
Bao, Qinkun+3 more
openaire +2 more sources
Federated Learning in Side-Channel Analysis
2021Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire +2 more sources
Side-Channel Analysis of Keymill
2017One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Thomas Korak+3 more
openaire +2 more sources