Results 131 to 140 of about 1,857,403 (288)
Algebraic side‐channel attacks on Trivium stream cipher
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj +1 more source
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
Alahmadi AN +5 more
europepmc +1 more source
β‐Catenin/c‐Myc Axis Modulates Autophagy Response to Different Ammonia Concentrations
Ammonia, detoxified by the liver into urea and glutamine, impacts autophagy differently at varying levels. Low ammonia activates autophagy via c‐Myc and β‐catenin, while high levels suppress it. Using Huh7 cells and Spf‐ash mice, c‐Myc's role in cytoprotective autophagy is revealed, offering insights into hyperammonemia and potential therapeutic ...
S. Sergio +11 more
wiley +1 more source
Cross subkey side channel analysis based on small samples. [PDF]
Hu F, Wang H, Wang J.
europepmc +1 more source
Acoustic side channels (ASCs) have been discovered for several decades, highlighting the tangible security risks posed by unintended sound emissions from computing and electronic systems. Their existence has drawn considerable attention from researchers, driving rapid progress in both attack methodologies and defense mechanisms across a wide range of ...
Ping Wang +4 more
openaire +2 more sources
Powder metal processing provides scalable advantages in nanoporous (np) metal development. Mechanical alloying is used to produce unique precursors for hybrid nanopore formation by oxide reduction and dealloying. As demonstrated in np Ag, this approach improves process efficiency while promoting smaller ligaments and larger pores, both of which are ...
Mark A. Atwater, Oliver A. Fowler
wiley +1 more source
Planar Solid‐State Nanopores Toward Scalable Nanofluidic Integration Based on CMOS Technology
We present a scalable silicon‐based fabrication strategy for planar solid‐state nanopores to enable their integration with complex nanofluidic systems. Prototype devices demonstrate normal voltage‐current characteristics, good noise performance, and appreciable streaming currents. Our CMOS‐compatible fabrication process offers precise geometric control
Ngan Hoang Pham +7 more
wiley +1 more source
Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack. [PDF]
Nassiri Abrishamchi MA +4 more
europepmc +1 more source
Software Grand Exposure: SGX Cache Attacks Are Practical
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand +5 more
core

