Results 81 to 90 of about 32,448 (286)
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy. [PDF]
Tănăsescu A+3 more
europepmc +1 more source
Poly(heptazine) imides (PHIs), a crystalline carbon nitride subclass, intercalate metals to deliver high stability, tunable electronics, and efficient charge separation. These features enable solar‐driven applications such as hydrogen evolution, CO₂ reduction, and organic synthesis.
Gabriel A. A. Diab+6 more
wiley +1 more source
Side-channel attacks on convolutional neural networks based on the hybrid attention mechanism
In the field of security assessment of password chips, side-channel attacks are an important and effective means of extracting sensitive information by analysing the physical characteristics of the chip during operation, providing an important basis for ...
Tao Feng+3 more
doaj +1 more source
Beat the Heat: Syscall Attack Detection via Thermal Side Channel
As the complexity and integration of electronic devices increase, understanding and mitigating side-channel vulnerabilities will remain a critical area of cybersecurity research.
Teodora Vasilas+2 more
doaj +1 more source
Since Advanced Encryption Standard (AES) in stream modes, such as counter (CTR), output feedback (OFB) and cipher feedback (CFB), can meet most industrial requirements, the range of applications for dedicated stream ciphers is decreasing.
Jun Choi+3 more
doaj +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Lejla Batina+2 more
openaire +2 more sources
Coating the standard polypropylene separator with a porous red phosphorous nanosheet greatly improves cycling performance in Li electrode cells. The phosphorus‐based surface chemistry deactivates electrolyte solvent decomposition and enhances the cleavage of F‐containing salt, resulting in an inorganic‐dominated electrolyte interphase (SEI) composition
Jiangpeng Wang+9 more
wiley +1 more source
Side channel attack of cipher chips based on difference variability
Side channel attack (SCA) has the problems of high sample quantity and long analysis time. Noise of side channel leakage and its differential reduction method are researched combined with the architecture of micro control unit (MCU).
Yang ZHANG+4 more
doaj +2 more sources
Flow‐Induced Vascular Remodeling on‐Chip: Implications for Anti‐VEGF Therapy
Flow‐induced vascular remodeling plays a critical role in network stabilization and function. Using a vasculature‐on‐chip system, this study reveals how physiological VEGF levels and flow affect vascular remodeling and provides insights into tumor vessel normalization.
Fatemeh Mirzapour‐Shafiyi+6 more
wiley +1 more source
Side-Channel Attacks on Textbook RSA and ElGamal Encryption [PDF]
Ulrich Kühn
openalex +1 more source