Results 31 to 40 of about 1,590,243 (282)

Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing

open access: yesSensors, 2022
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin   +3 more
doaj   +1 more source

Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage

open access: yesSensors, 2022
With the development of 5G and network technology, the usage of IoT devices has become popular. Because most of these IoT devices can be controlled by an adversary away from the administrator, several security issues such as firmware dumping can arise ...
Daehyeon Bae, Jaecheol Ha
doaj   +1 more source

Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]

open access: yes, 2013
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt   +76 more
core   +2 more sources

Deep Learning Method for Power Side-Channel Analysis on Chip Leakages

open access: yesElektronika ir Elektrotechnika, 2023
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed   +2 more
doaj   +1 more source

The Three Node Wireless Network: Achievable Rates and Cooperation Strategies

open access: yes, 2005
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ...
Gamal, Hesham El, Lai, Lifeng, Liu, Ke
core   +3 more sources

Convolutional Neural Networks for Profiled Side-channel Analysis [PDF]

open access: yesRadioengineering, 2019
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the ...
S. R. Hou, Y. J. Zhou, H. M. Liu
doaj  

On the Machine Learning Techniques for Side-channel Analysis [PDF]

open access: yes, 2016
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain   +2 more
core  

A Template Attack Against VERIFY PIN Algorithms [PDF]

open access: yes, 2016
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno   +4 more
core   +3 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

Automated Generation of Masked Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking has been recognized as a sound and secure countermeasure for cryptographic implementations, protecting against physical side-channel attacks. Even though many different masking schemes have been presented over time, design and implementation of ...
David Knichel   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy