Results 61 to 70 of about 2,490,029 (269)
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security.
Sunghyun Jin +3 more
doaj +1 more source
On the Machine Learning Techniques for Side-channel Analysis [PDF]
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain +2 more
core
In this paper, we analyze the performance of regularized channel inversion (RCI) precoding in multiple-input single-output (MISO) broadcast channels with confidential messages under transmit-side channel correlation.
Al-nahari, Azzam Y. +3 more
core +1 more source
A Template Attack Against VERIFY PIN Algorithms [PDF]
International audienceThis paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials.
Barry, Thierno +4 more
core +3 more sources
Improving Side-Channel Analysis Through Semi-supervised Learning [PDF]
The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security evaluator (i.e., attacker) gains access to a profiling device to build a precise model which is used to attack another device in the attacking phase.
Picek, Stjepan +4 more
openaire +3 more sources
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Recently, several studies have been published on the application of deep learning to enhance Side-Channel Attacks (SCA). These seminal works have practically validated the soundness of the approach, especially against implementations protected by masking
Loïc Masure, Cécile Canovas, E. Prouff
semanticscholar +1 more source
An updated analysis of radion-higgs mixing in the light of LHC data
We explore the constraints on the parameter space of a Randall-Sundrum warped geometry scenario, where a radion field arises out of the attempt to stabilise the radius of the extra compact spacelike dimension, using the most recent data from higgs ...
Desai, Nishita +2 more
core +1 more source
Parallel single cell analysis on an integrated microfluidic platform for cell trapping, lysis and analysis [PDF]
We report here a novel and easily scalable microfluidic platform for the parallel analysis of hundreds of individual cells, with controlled single cell trapping, followed by their lysis and subsequent retrieval of the cellular content for on-chip ...
Berg, A. van den +5 more
core +1 more source
A General Framework for Transmission with Transceiver Distortion and Some Applications
A general theoretical framework is presented for analyzing information transmission over Gaussian channels with memoryless transceiver distortion, which encompasses various nonlinear distortion models including transmit-side clipping, receive-side analog-
Zhang, Wenyi
core +1 more source
Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage
With the development of 5G and network technology, the usage of IoT devices has become popular. Because most of these IoT devices can be controlled by an adversary away from the administrator, several security issues such as firmware dumping can arise ...
Daehyeon Bae, Jaecheol Ha
doaj +1 more source

