Results 31 to 40 of about 1,590,465 (281)
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos +3 more
doaj +1 more source
Symbolic Analysis of Higher-Order Side Channel Countermeasures [PDF]
In this paper, we deal with the problem of efficiently assessing the higher order vulnerability of a hardware cryptographic circuit. Our main concern is to provide methods that allow a circuit designer to detect early in the design cycle if the implementation of a Boolean-additive masking countermeasure does not hold up to the required protection order.
Bisi E, Melzani F, Zaccaria V
openaire +2 more sources
Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt +76 more
core +2 more sources
The Three Node Wireless Network: Achievable Rates and Cooperation Strategies
We consider a wireless network composed of three nodes and limited by the half-duplex and total power constraints. This formulation encompasses many of the special cases studied in the literature and allows for capturing the common features shared by ...
Gamal, Hesham El, Lai, Lifeng, Liu, Ke
core +3 more sources
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain +2 more
core
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
A Template Attack Against VERIFY PIN Algorithms [PDF]
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno +4 more
core +3 more sources
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
Convolutional Neural Networks for Profiled Side-channel Analysis [PDF]
Recent studies have shown that deep learning algorithms are very effective for evaluating the security of embedded systems. The deep learning technique represented by Convolutional Neural Networks (CNNs) has proven to be a promising paradigm in the ...
S. R. Hou, Y. J. Zhou, H. M. Liu
doaj
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region.
Ferrante, Augusto +4 more
core +1 more source

