Results 51 to 60 of about 231,688 (280)

Frequency Throttling Side-Channel Attack

open access: yesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management ...
Liu, Chen   +3 more
openaire   +2 more sources

Cell wall target fragment discovery using a low‐cost, minimal fragment library

open access: yesFEBS Letters, EarlyView.
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan   +5 more
wiley   +1 more source

Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure

open access: yesApplied Sciences, 2018
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal ...
Sung Min Cho, Sunghyun Jin, HeeSeok Kim
doaj   +1 more source

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

open access: yesPRX Quantum, 2021
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens.
Mathieu Bozzio   +4 more
doaj   +1 more source

Janus: An Uncertain Cache Architecture to Cope with Side Channel Attacks

open access: yes, 2017
Side channel attacks are a major class of attacks to crypto-systems. Attackers collect and analyze timing behavior, I/O data, or power consumption in these systems to undermine their effectiveness in protecting sensitive information.
Darabi, Mostafa   +4 more
core   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation

open access: yesIEEE Access, 2019
The cache side channel leakage is a very serious security issue in the information security field. In order to solve this problem, a large number of security mechanisms have been applied to protect the cache.
Limin Wang   +3 more
doaj   +1 more source

Using of asynchronous circuits to increase protection against side channels attacks

open access: yesБезопасность информационных технологий, 2022
The aim of this study is to analyze the use of asynchronous circuits to improve the security of information systems against side-channels attacks, which are means of obtaining unauthorized access to confidential data and performing unauthorized actions ...
Igor A. Danilov, Pavel S. Dolotov
doaj   +1 more source

Linking neurogenesis, oligodendrogenesis, and myelination defects to neurodevelopmental disruption in primary mitochondrial disorders

open access: yesFEBS Letters, EarlyView.
Mitochondrial remodeling shapes neural and glial lineage progression by matching metabolic supply with demand. Elevated OXPHOS supports differentiation and myelin formation, while myelin compaction lowers mitochondrial dependence, revealing mitochondria as key drivers of developmental energy adaptation.
Sahitya Ranjan Biswas   +3 more
wiley   +1 more source

ISAP – Towards Side-Channel Secure Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared
Christoph Dobraunig   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy