Results 81 to 90 of about 399,159 (347)
ISAP – Towards Side-Channel Secure Authenticated Encryption
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared
Christoph Dobraunig +4 more
doaj +1 more source
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey +2 more
doaj +1 more source
ABSTRACT Objective This study aimed to systematically observe the clinical manifestations, immune cell subsets, and dynamic changes in serological indicators in patients with myasthenia gravis (MG) before and after efgartigimod (EFG) treatment. Methods We analyzed the baseline data, laboratory parameters, and lymphocyte subset proportions in MG ...
Tiancheng Luo +9 more
wiley +1 more source
Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders
In recent years, deep learning-based side-channel attacks have established their position as mainstream. However, most deep learning techniques for cryptanalysis mainly focused on classifying side-channel information in a profiled scenario where ...
Donggeun Kwon, Heeseok Kim, Seokhie Hong
doaj +1 more source
Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker +16 more
core +1 more source
Functional Connectivity Linked to Cognitive Recovery After Minor Stroke
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri +7 more
wiley +1 more source
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model [PDF]
Qihong Yu, Jiguo Li, Sai Ji
openalex +1 more source
Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani +8 more
wiley +1 more source
Combined Side Channel Attacks: breaking COMP128
Different variants of combined side channel attacks (SCA) on authentication protocol COMP128 are analyzed in the article, paper. Main attack presented in the paper is partitioning attack.
Alla Borisovna Levina +1 more
doaj
WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
High resolution and stealthy attacks and their variants such as Flush+Reload, Flush+Flush, Prime+Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel’s computing architecture over the past few years.
M. Mushtaq +6 more
semanticscholar +1 more source

