Results 261 to 270 of about 212,817 (301)
Some of the next articles are maybe not open access.

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

Radiation therapy‐associated toxicity: Etiology, management, and prevention

Ca-A Cancer Journal for Clinicians, 2021
Kyle Wang
exaly  

Recent progress in the treatment of cancer in children

Ca-A Cancer Journal for Clinicians, 2021
Theodore W Laetsch
exaly  

A Power Side-Channel Attack on the CCA2-Secure HQC KEM

IACR Cryptology ePrint Archive, 2020
T. Schamberger   +3 more
semanticscholar   +1 more source

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA

IACR Cryptology ePrint Archive, 2019
Léo Weissbart, S. Picek, L. Batina
semanticscholar   +1 more source

Foundations of Side-Channel Attacks

2021
Maamar Ouladj, Sylvain Guilley
openaire   +1 more source

Home - About - Disclaimer - Privacy