Results 301 to 310 of about 2,326,402 (364)
Insights from aquaporin structures into drug-resistant sleeping sickness
Matusevicius M+22 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Abacus: Precise Side-Channel Analysis
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities.
Qinkun Bao+4 more
semanticscholar +3 more sources
A Review and Comparison of AI-enhanced Side Channel Analysis
ACM Journal on Emerging Technologies in Computing Systems, 2022Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern computing systems. The vast majority of communications are secured through cryptographic algorithms.
Max Panoff, H. Yu, Haoqi Shan, Yier Jin
semanticscholar +1 more source
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses
IEEE Transactions on Dependable and Secure Computing, 2022Website Fingerprinting attacks aim to track the visited websites in browsers and infer confidential information about users. Several studies showed that recent advancements in Machine Learning (ML) and Deep Learning (DL) algorithms made it possible to ...
Berk Gulmezoglu
semanticscholar +1 more source
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
Euromicro Symposium on Digital Systems Design, 2022In the ongoing last round of NIST's post-quantum cryptography standardization competition, side-channel analysis of finalists is a main focus of attention. While their resistance to timing, power and near field electromagnetic (EM) side-channels has been
Ruize Wang, Kalle Ngo, E. Dubrova
semanticscholar +1 more source
Counteract Side-Channel Analysis of Neural Networks by Shuffling
Design, Automation and Test in Europe, 2022Machine learning is becoming an essential part in almost every electronic device. Implementations of neural networks are mostly targeted towards computational performance or memory footprint.
Manuel Brosch, Matthias Probst, G. Sigl
semanticscholar +1 more source
Side channel analysis of SPECK
Journal of Computer Security, 2020SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
R. Balasubramanian+3 more
openaire +2 more sources
Use of Simulators for Side-Channel Analysis
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Sylvain Guilley, Nikita Veshchikov
openaire +2 more sources
Side channel analysis of an automotive microprocessor
IET Irish Signals and Systems Conference (ISSC 2008), 2008Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain information about the car and dictate how the car behaves.
Hamilton, Mark+3 more
openaire +2 more sources