Results 121 to 130 of about 2,490,029 (269)

Chosen message attacks method against ECC implementations

open access: yesTongxin xuebao, 2014
Chosen-message side-channel analysis attacks for public-key cryptosystems based on scalar multiplications was proposed, where special input point P is chosen to have the features of special y-coordinate to generate noticeable variations on power ...
Peng LUO   +3 more
doaj  

Analysis of Flow Direction Effects in a Single-Channel Serpentine Geometry for PEM Fuel Cells at the Cathode Side

open access: diamond, 2023
José CEBALLOS-PÉREZ   +6 more
openalex   +1 more source

Déjà Vu: Side-Channel Analysis of Mozilla's NSS [PDF]

open access: gold, 2020
Sohaib ul Hassan   +6 more
openalex   +1 more source

Hardware Trojans detection based on projection pursuit

open access: yesTongxin xuebao, 2013
A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension ...
Peng ZHANG, Xin-cheng WANG, Qing ZHOU
doaj  

Side channel analysis and countermeasures

open access: yes, 2012
This thesis deals with side channel attacks against hardware implementations of cryp- tographic algorithms. Studies conducted in this document are therefore in place where an adversary has access to noisy observations of intermediate results of a cryptographic computation.
openaire   +1 more source

Home - About - Disclaimer - Privacy