Results 121 to 130 of about 2,490,029 (269)
Chosen message attacks method against ECC implementations
Chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications was proposed, where special input point P is chosen to have the features of special y-coordinate to generate noticeable variations on power ...
Peng LUO +3 more
doaj
FGM-Copula based Analysis of Physical Layer Security in Wireless Wiretap Channels with UAV Transmitter and Two-Sided Side Information [PDF]
Hadi Asghari, Ghosheh Abed Hodtani
openalex +1 more source
Déjà Vu: Side-Channel Analysis of Mozilla's NSS [PDF]
Sohaib ul Hassan +6 more
openalex +1 more source
Hardware Trojans detection based on projection pursuit
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj
Accelerating Side Channel Analysis With Distributed And Parallelized Processing
Kyunghee Oh, Dooho Choi
openalex +2 more sources
Side channel analysis and countermeasures
This thesis deals with side channel attacks against hardware implementations of cryp- tographic algorithms. Studies conducted in this document are therefore in place where an adversary has access to noisy observations of intermediate results of a cryptographic computation.
openaire +1 more source
Hardware Trojan Detection Based on Side-Channel Analysis Using Power Traces and Machine Learning [PDF]
Van‐Phuc Hoang
openalex +1 more source
Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack [PDF]
Songran Liu, Wang Yi
openalex +1 more source

