Results 281 to 286 of about 32,448 (286)
Some of the next articles are maybe not open access.
Side Channel Attacks on the Embedded System
2009Design for security not only involves the design of security functions which meet price, performance, power, and other constraints, but also resistance to attacks. An attack may be successful in extracting the secret key solely from the side channel signals recorded from a device executing a cryptographic algorithm.
openaire +2 more sources
Session details: Side Channel Attacks
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017openaire +1 more source