Results 51 to 60 of about 2,326,402 (364)
Hardware Implementation and Side-Channel Analysis of Lapin [PDF]
Lapin is a new authentication protocol that has been de- signed for low-cost implementations. In a work from RFIDsec 2012, Berstein and Lange argued that at similar (mathematical) security lev- els, Lapin's performances are below the ones of block cipher based au- thentication. In this paper, we suggest that as soon as physical security (e.g.
Gaspar, Lubos+3 more
openaire +4 more sources
Investment cost channel and monetary transmission [PDF]
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Aksoy, Yunus+2 more
core +3 more sources
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper+4 more
doaj +1 more source
Side-channel analysis of SEcube™ platform
Cryptography provides techniques to cypher and de-cypher sensitive information through a token called key in order to store and transmit it across insecure networks. The goal of cryptography is to protect information from potential attackers and to enable access to authorized users only.
Bollo, Matteo+3 more
openaire +3 more sources
Two-stage Channel Frequency Response Estimation in OFDM Systems [PDF]
This paper proposes two-stage channel frequency response estimation algorithm in communication systems with OFDM technology. Algorithm is based on Kalman filter. Pilots from current and previous OFDM symbols are used for channel estimation.
Myronchuk, Oleksandr+2 more
core +2 more sources
Since Kocher (CRYPTO’96) proposed timing attack, side channel analysis (SCA) has shown great potential to break cryptosystems via physical leakage. Recently, deep learning techniques are widely used in SCA and show equivalent and even better performance ...
Jiajia Zhang+4 more
semanticscholar +1 more source
Designed Azolopyridinium Salts Block Protective Antigen Pores In Vitro and Protect Cells from Anthrax Toxin [PDF]
Background:Several intracellular acting bacterial protein toxins of the AB-type, which are known to enter cells by endocytosis, are shown to produce channels.
A Kronhardt+76 more
core +2 more sources
Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis
The increasing use of smartphones has increased their presence in legal and corporate investigations. Unlike desktop and laptop computers, forensic analysis of smartphones is a challenging task due to their limited interfaces to retrieve information of ...
Asanka P. Sayakkara, Nhien-An Le-Khac
doaj +1 more source
Spatial patterns in macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain [PDF]
We examined the spatial structure of macroinvertebrate assemblages in surface-flowing waters of a glacially-influenced floodplain. The floodplain main-channel responded longitudinally to changes in hydrology with evident coarse-scale zones of upwelling ...
Doering, Michael, Robinson, Christopher
core +1 more source
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos+3 more
doaj +1 more source