Results 21 to 30 of about 1,590,243 (282)

Single Trace Side Channel Analysis on NTRU Implementation

open access: yesApplied Sciences, 2018
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance against
Soojung An   +4 more
doaj   +1 more source

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper   +4 more
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Recent advances in deep learning‐based side‐channel analysis

open access: yesETRI Journal, 2020
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis.
Sunghyun Jin   +3 more
doaj   +1 more source

Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis

open access: yesIEEE Access, 2021
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj   +1 more source

Side-channel analysis of SEcube™ platform

open access: yes2017 IEEE East-West Design & Test Symposium (EWDTS), 2017
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo   +3 more
openaire   +2 more sources

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

An electrostatic mechanism for Ca(2+)-mediated regulation of gap junction channels. [PDF]

open access: yes, 2016
Gap junction channels mediate intercellular signalling that is crucial in tissue development, homeostasis and pathologic states such as cardiac arrhythmias, cancer and trauma.
Abagyan, Ruben   +9 more
core   +3 more sources

Investment cost channel and monetary transmission [PDF]

open access: yes, 2011
Copyright @ 2011 Central Bank Review. This article is available open access through the publisher’s website at the link below.We show that a standard DSGE model with investment cost channels has important model stability and policy implications.
Basso, HS, Coto-Martinez, J
core   +2 more sources

Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]

open access: yesIEEE Transactions on Computers, 2017
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire   +2 more sources

Home - About - Disclaimer - Privacy