Results 231 to 240 of about 230,889 (263)

Mepyramine targets mutant Nav1.7 channels to relieve pain and erythema in primary erythromelalgia patients. [PDF]

open access: yesFront Med (Lausanne)
Ducrocq M   +5 more
europepmc   +1 more source

Side-Channel Attack Pitfalls

2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire   +1 more source

Side Channel Attacks vs Approximate Computing

Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020
Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire   +3 more sources

Electromagnetic side-channel attacks

Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara   +2 more
openaire   +1 more source

Thwarting side-channel attacks

Communications of the ACM, 2020
Deep learning challenges chip security.
openaire   +1 more source

Side Channel Attacks on GPUs

IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari   +3 more
openaire   +1 more source

Timing and Side Channel Attacks

2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Resh Amit, Zaidenberg Nezer
openaire   +2 more sources

Home - About - Disclaimer - Privacy