Results 61 to 70 of about 373,745 (119)
Continuous polarization-wavelength mapping with nonlocal metasurfaces. [PDF]
Wang J +11 more
europepmc +1 more source
Explainable machine learning for incipient anomaly detection in compact molten salt heat exchanger with overlapping feature distributions. [PDF]
Prantikos K +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Abacus: Precise Side-Channel Analysis
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities. However, in practice, many such vulnerabilities leak a negligible amount of sensitive information, and thus developers are often reluctant to address them ...
Qinkun Bao +4 more
openaire +1 more source
Side channel analysis of SPECK
Journal of Computer Security, 2020SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
Joseph, Mabin +2 more
openaire +1 more source
Side Channel Analysis Resistant Design Flow
2006 IEEE International Symposium on Circuits and Systems, 2006The threat of side-channel attacks (SCA) is of crucial importance when designing systems with cryptographic hardware or software. The FP6-funded project SCARD enhances the typical micro-chip design flow in order to provide a means for designing side-channel resistant circuits and systems.
Aigner, M +7 more
openaire +2 more sources
Side-Channel Analysis of Keymill
2017One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Christoph Dobraunig +3 more
openaire +1 more source
Photonic Side-Channel Analysis of Arbiter PUFs
Journal of Cryptology, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tajik, Shahin +8 more
openaire +3 more sources

