Results 21 to 30 of about 1,590,465 (281)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

The Benefits and Costs of Netlist Randomization Based Side-Channel Countermeasures: An In-Depth Evaluation

open access: yesJournal of Low Power Electronics and Applications, 2022
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar   +2 more
doaj   +1 more source

Overview of Side Channel Analysis Based on Convolutional Neural Network [PDF]

open access: yesJisuanji kexue, 2022
The profiled side-channel analysis method can effectively attack the implementation of cryptographic,and the side-channel cryptanalysis method based on convolutional neural network (CNNSCA) can efficiently carry out cryptographic attacks,and even can ...
LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang
doaj   +1 more source

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Side-channel analysis of SEcube™ platform

open access: yes2017 IEEE East-West Design & Test Symposium (EWDTS), 2017
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo   +3 more
openaire   +2 more sources

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper   +4 more
doaj   +1 more source

Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2023
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj   +1 more source

Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis

open access: yesIEEE Access, 2021
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj   +1 more source

An electrostatic mechanism for Ca(2+)-mediated regulation of gap junction channels. [PDF]

open access: yes, 2016
Gap junction channels mediate intercellular signalling that is crucial in tissue development, homeostasis and pathologic states such as cardiac arrhythmias, cancer and trauma.
Abagyan, Ruben   +9 more
core   +3 more sources

Investment cost channel and monetary transmission [PDF]

open access: yes, 2011
Copyright @ 2011 Central Bank Review. This article is available open access through the publisher’s website at the link below.We show that a standard DSGE model with investment cost channels has important model stability and policy implications.
Basso, HS, Coto-Martinez, J
core   +2 more sources

Home - About - Disclaimer - Privacy