Results 81 to 90 of about 2,490,029 (269)

Side Channel Leakages Against Financial IC Card of the Republic of Korea

open access: yesApplied Sciences, 2018
Integrated circuit (IC) chip cards are commonly used in payment system applications since they can provide security and convenience simultaneously. More precisely, Europay, MasterCard, and VISA (EMV) are widely known to be well equipped with security ...
Yoo-Seung Won   +2 more
doaj   +1 more source

The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

open access: yes, 2018
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world.
Conti, Mauro   +3 more
core   +1 more source

Investment Cost Channel and Monetary Transmission [PDF]

open access: yes
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Henrique S. Basso   +2 more
core  

Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rate, valid for any possible distinguishing rule and with
Éloi de Chérisey   +3 more
semanticscholar   +1 more source

PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software solutions to address computational challenges are ubiquitous in our daily lives. One specific application area where software is often used is in embedded systems, which, like other digital electronic devices, are vulnerable to side-channel ...
Jannik Zeitschner, Amir Moradi
doaj   +1 more source

Quantitative approaches to linguistic variation in IRC : implications for qualitative research [PDF]

open access: yes, 2008
Qualitative analysis of code choice, code switching, and language style in Internet Relay Chat (IRC) can shed light on functional-pragmatic aspects of the use of different linguistic varieties.
Siebenhaar, Beat
core  

MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V [PDF]

open access: green, 2023
Jan Wichelmann   +4 more
openalex   +1 more source

Polynomial Evaluation and Side Channel Analysis [PDF]

open access: yes, 2016
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire   +3 more sources

On the Effective Capacity of Two-Hop Communication Systems [PDF]

open access: yes, 2010
In this paper, two-hop communication between a source and a destination with the aid of an intermediate relay node is considered. Both the source and intermediate relay node are assumed to operate under statistical quality of service (QoS) constraints ...
Gursoy, Mustafa Cenk   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy