Results 61 to 70 of about 1,590,465 (281)
An Automated End-to-End Side Channel Analysis Based on Probabilistic Model
In this paper, we propose a new automated way to find out the secret exponent from a single power trace. We segment the power trace into subsignals that are directly related to recovery of the secret exponent.
Jeonghwan Hwang, Ji Won Yoon
doaj +1 more source
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
Side-Channel Analysis of Chaos-Based Substitution Box Structures
There is a theoretically strong relationship between chaos and cryptology. In practice, one of the most successful applications of this relationship is chaos-based s-box structures.
Mehmet Sahin Acikkapi +2 more
doaj +1 more source
NKCC1: A key regulator of glioblastoma progression
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen +5 more
wiley +1 more source
On XTR and Side-Channel Analysis [PDF]
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods. Lenstra and Verheul recently introduced XTR, a cryptosystem that can compete with ECC in terms of processing and bandwidth requirements. These properties make XTR
Page, Daniel, Stam, Martijn
openaire +1 more source
Comparison between Side-Channel Analysis Distinguishers [PDF]
Side-channel analyses allow to extract keys from devices whatever their length. They rely on tools called "distinguishers". In this paper, we intend to compare two generic distinguishers per se: we provide a characterization environment where all the implementation details are equal, hence a fair comparison. In the field of distinguishers that use a
Houssem Maghrebi +3 more
openaire +1 more source
Here, we demonstrate that HS1BP3 interacts with Cortactin through a proline‐rich region (PRR3.1) and show that this interaction, and HS1BP3 itself, promote cancer cell proliferation and invasion. Inhibition of this interaction leads to build‐up of TKS5 in multivesicular endosomes and altered secretion of CD63 and CD9, providing an explanation for the ...
Arja Arnesen Løchen +9 more
wiley +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3.
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
We found that during chemotherapy‐induced alopecia (CIA), Sonic hedgehog (Shh) expression significantly decreased in hair follicle Shh+ cells, whereas the Janus‐activated kinase/signal transducer and activator of transcription 1 (JAK/STAT1) signaling pathway was markedly activated.
Ruifang Fan +6 more
wiley +1 more source
A Modular and Optimized Toolbox for Side-Channel Analysis
The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical devices.
Alberto Fuentes Rodriguez +3 more
doaj +1 more source

