Results 41 to 50 of about 1,590,243 (282)

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules

open access: yesJournal of Low Power Electronics and Applications, 2017
Over the last few decades, computer-aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business.
Sorin A. Huss, Oliver Stein
doaj   +1 more source

An Automated End-to-End Side Channel Analysis Based on Probabilistic Model

open access: yesApplied Sciences, 2020
In this paper, we propose a new automated way to find out the secret exponent from a single power trace. We segment the power trace into subsignals that are directly related to recovery of the secret exponent.
Jeonghwan Hwang, Ji Won Yoon
doaj   +1 more source

On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels

open access: yes, 2014
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region.
Ferrante, Augusto   +4 more
core   +1 more source

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems

open access: yesIEEE Open Journal of the Computer Society
Electromagnetic Side Channel Analysis (EM-SCA) is a major area of interest within the field of cybersecurity. EM-SCA makes use of the electromagnetic radiation that naturally leaks from any device that runs on electricity.
Yomna Mokhtar Ibrahim   +3 more
doaj   +1 more source

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe   +2 more
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Deep Learning-based Side Channel Attack on HMAC SM3.

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2020
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Improving Side-Channel Analysis Through Semi-supervised Learning [PDF]

open access: yes, 2019
The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security evaluator (i.e., attacker) gains access to a profiling device to build a precise model which is used to attack another device in the attacking phase.
Picek, Stjepan   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy