Results 321 to 330 of about 399,159 (347)
Some of the next articles are maybe not open access.

Thwarting side-channel attacks

Communications of the ACM, 2020
Deep learning challenges chip security.
openaire   +1 more source

Timing and Side Channel Attacks

2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Resh Amit, Zaidenberg Nezer
openaire   +2 more sources

Mitigating Electromagnetic Side-Channel Attacks

Advances in Multidisciplinary and scientific Research Journal Publication, 2022
By providing new sources of electronic evidence, the Internet of Things (IoT) has opened up new possibilities for digital forensics. Obtaining electronic data from IoT, on the other hand, is a difficult process for a variety of reasons, including the use of various types of standard interfaces, the use of light-weight data encryption, such as elliptic ...
openaire   +1 more source

Combined Side-Channel Attacks

2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid   +3 more
openaire   +1 more source

Real-Time Detection on Cache Side Channel Attacks using Performance Counter Monitor

Information and Communication Technology Convergence, 2019
Cache side-channel attack extracts secret information by monitoring cache behavior of a victim. Normally, this attack targets a L3 cache which is shared between a spy and a victim.
JongHyeon Cho   +3 more
semanticscholar   +1 more source

Side Channel Attack

2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire   +1 more source

Embedded Cryptography: Side Channel Attacks

2006
This article gives an overview of state-of-the-art side channel attacks and corresponding countermeasures which are currently discussed in the scientific literature. We compare different attacks with respect to the algorithms attacked, measurement costs, efficiency and practicability.
Kai Schramm   +2 more
openaire   +1 more source

Side-Channel Attacks

2023
Lejla Batina, Ileana Buhan
openaire   +1 more source

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

Home - About - Disclaimer - Privacy