Results 51 to 60 of about 1,857,403 (288)

SCANN: Side Channel Analysis of Spiking Neural Networks

open access: yesCryptography, 2023
Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep neural networks (DNNs). Compared to DNNs, SNNs are computationally more powerful and energy efficient.
Karthikeyan Nagarajan   +4 more
doaj   +1 more source

Wiretap Channel With Side Information [PDF]

open access: yesIEEE Transactions on Information Theory, 2006
This correspondence gives an achievable rate equivocation region for the discrete memoryless wiretap channel with side information. We extend our results to the Gaussian case. The main contribution of this correspondence is that, for the Gaussian wiretap channel, the side information helps to get a larger secrecy capacity and a larger rate equivocation
Vinck, A. J. Han, Chen, Yanling
openaire   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Weakly Profiling Side-channel Analysis

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling.
Lichao Wu   +2 more
doaj   +1 more source

Certified Side Channels

open access: yes, 2019
Accepted to USENIX Security Symposium ...
García, Cesar Pereida   +5 more
openaire   +2 more sources

SonarSnoop: active acoustic side-channel attacks [PDF]

open access: yesInternational Journal of Information Security, 2019
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng   +3 more
openaire   +5 more sources

Potential therapeutic targeting of BKCa channels in glioblastoma treatment

open access: yesMolecular Oncology, EarlyView.
This review summarizes current insights into the role of BKCa and mitoBKCa channels in glioblastoma biology, their potential classification as oncochannels, and the emerging pharmacological strategies targeting these channels, emphasizing the translational challenges in developing BKCa‐directed therapies for glioblastoma treatment.
Kamila Maliszewska‐Olejniczak   +4 more
wiley   +1 more source

Load-to-store: exploit the time leakage of store buffer transient window

open access: yesTongxin xuebao, 2023
To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass
Ming TANG, Yifan HU
doaj   +2 more sources

Algebraic Side-Channel Attack on Twofish [PDF]

open access: yesJournal of Internet Services and Information Security, 2017
While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish.
Chujiao Ma, John Chandy, Zhijie Shi
doaj  

Side-Channel-Free Quantum Key Distribution [PDF]

open access: yesPhysical Review Letters, 2012
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual
Braunstein, Samuel L.   +1 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy