Results 131 to 140 of about 1,857,403 (288)

Algebraic side‐channel attacks on Trivium stream cipher

open access: yesIET Communications
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj   +1 more source

Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]

open access: yesSensors (Basel), 2022
Alahmadi AN   +5 more
europepmc   +1 more source

Side channel spillways

open access: yes, 1977
Bibliography: pages 101-102.
openaire   +1 more source

β‐Catenin/c‐Myc Axis Modulates Autophagy Response to Different Ammonia Concentrations

open access: yesAdvanced Biology, Volume 9, Issue 3, March 2025.
Ammonia, detoxified by the liver into urea and glutamine, impacts autophagy differently at varying levels. Low ammonia activates autophagy via c‐Myc and β‐catenin, while high levels suppress it. Using Huh7 cells and Spf‐ash mice, c‐Myc's role in cytoprotective autophagy is revealed, offering insights into hyperammonemia and potential therapeutic ...
S. Sergio   +11 more
wiley   +1 more source

SoK: Acoustic Side Channels

open access: yesACM Computing Surveys
Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of ...
Ping Wang   +4 more
openaire   +2 more sources

Low‐Cost, Large‐Scale Nanoporous Metals by Mechanical Alloying, Oxide Reduction, and Dealloying of Powders

open access: yesAdvanced Engineering Materials, EarlyView.
Powder metal processing provides scalable advantages in nanoporous (np) metal development. Mechanical alloying is used to produce unique precursors for hybrid nanopore formation by oxide reduction and dealloying. As demonstrated in np Ag, this approach improves process efficiency while promoting smaller ligaments and larger pores, both of which are ...
Mark A. Atwater, Oliver A. Fowler
wiley   +1 more source

Planar Solid‐State Nanopores Toward Scalable Nanofluidic Integration Based on CMOS Technology

open access: yesAdvanced Engineering Materials, EarlyView.
We present a scalable silicon‐based fabrication strategy for planar solid‐state nanopores to enable their integration with complex nanofluidic systems. Prototype devices demonstrate normal voltage‐current characteristics, good noise performance, and appreciable streaming currents. Our CMOS‐compatible fabrication process offers precise geometric control
Ngan Hoang Pham   +7 more
wiley   +1 more source

Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. [PDF]

open access: yesSensors (Basel), 2022
Nassiri Abrishamchi MA   +4 more
europepmc   +1 more source

Software Grand Exposure: SGX Cache Attacks Are Practical

open access: yes, 2017
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand   +5 more
core  

Home - About - Disclaimer - Privacy