Results 51 to 60 of about 2,326,402 (364)

Hardware Implementation and Side-Channel Analysis of Lapin [PDF]

open access: yes, 2014
Lapin is a new authentication protocol that has been de- signed for low-cost implementations. In a work from RFIDsec 2012, Berstein and Lange argued that at similar (mathematical) security lev- els, Lapin's performances are below the ones of block cipher based au- thentication. In this paper, we suggest that as soon as physical security (e.g.
Gaspar, Lubos   +3 more
openaire   +4 more sources

Investment cost channel and monetary transmission [PDF]

open access: yes, 2011
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Aksoy, Yunus   +2 more
core   +3 more sources

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper   +4 more
doaj   +1 more source

Side-channel analysis of SEcube™ platform

open access: yes2017 IEEE East-West Design & Test Symposium (EWDTS), 2017
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo   +3 more
openaire   +3 more sources

Two-stage Channel Frequency Response Estimation in OFDM Systems [PDF]

open access: yes, 2020
This paper proposes two-stage channel frequency response estimation algorithm in communication systems with OFDM technology. Algorithm is based on Kalman filter. Pilots from current and previous OFDM symbols are used for channel estimation.
Myronchuk, Oleksandr   +2 more
core   +2 more sources

A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Since Kocher (CRYPTO’96) proposed timing attack, side channel analysis (SCA) has shown great potential to break cryptosystems via physical leakage. Recently, deep learning techniques are widely used in SCA and show equivalent and even better performance ...
Jiajia Zhang   +4 more
semanticscholar   +1 more source

Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]

open access: yes, 2013
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt   +76 more
core   +2 more sources

Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis

open access: yesIEEE Access, 2021
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj   +1 more source

Spatial patterns in macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain [PDF]

open access: yes, 2018
We examined the spatial structure of macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain. The floodplain main-channel responded longitudinally to changes in hydrology with evident coarse-scale zones of upwelling ...
Doering, Michael, Robinson, Christopher
core   +1 more source

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy