Results 311 to 320 of about 514,969 (347)
Some of the next articles are maybe not open access.
Thwarting side-channel attacks
Communications of the ACM, 2020Deep learning challenges chip security.
openaire +1 more source
Deep Learning Side-Channel Attack Against Hardware Implementations of AES
Euromicro Symposium on Digital Systems Design, 2019In the field of image recognition, machine learning technologies, especially deep learning, have been rapidly advancing alongside with the advances of hardware such as GPUs. In image recognition, in general, large numbers of labeled sets containing image
Takaya Kubota +3 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari +3 more
openaire +1 more source
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari +3 more
openaire +1 more source
IEEE Journal of Solid-State Circuits, 2019
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack (SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS using random fast voltage dithering (RFVD) enabled by integrated voltage ...
Arvind Singh +5 more
semanticscholar +1 more source
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack (SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS using random fast voltage dithering (RFVD) enabled by integrated voltage ...
Arvind Singh +5 more
semanticscholar +1 more source
Timing and Side Channel Attacks
2015How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Resh Amit, Zaidenberg Nezer
openaire +2 more sources
Mitigating Electromagnetic Side-Channel Attacks
Advances in Multidisciplinary and scientific Research Journal Publication, 2022By providing new sources of electronic evidence, the Internet of Things (IoT) has opened up new possibilities for digital forensics. Obtaining electronic data from IoT, on the other hand, is a difficult process for a variety of reasons, including the use of various types of standard interfaces, the use of light-weight data encryption, such as elliptic ...
openaire +1 more source
Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2019Power side-channel attacks pose a serious threat to the security of embedded devices. Most available countermeasures have significant overheads resulting in the application not meeting its requirements of low-power, high-performance and small area.
Patanjali Slpsk +3 more
semanticscholar +1 more source
Impact of Side Channel Attack in Information Security
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019Side channel attacks are such attacks that are being carried out on the application devices of a cryptosystem. A cryptosystem consists three algorithms as one for key generation, second for encryption and third for decryption purpose.
Himanshu Gupta +6 more
semanticscholar +1 more source
2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
Multi-label Deep Learning based Side Channel Attack
Asian Hardware-Oriented Security and Trust Symposium, 2019In this paper, a novel side channel attack method with multi-label deep learning is proposed, and it surpasses the state-of-the-art result in ASCAD benchmark dataset.
Libang Zhang +4 more
semanticscholar +1 more source

