Results 271 to 280 of about 349,795 (327)
Molecular Mechanism of ATP Hydrolysis Catalyzed by p97: A QM/MM Study. [PDF]
Szántó JK, Hulm A, Ochsenfeld C.
europepmc +1 more source
The weakness of WinRAR encrypted archives to compression side-channel attacks
Kristine Arthur-Durett
openalex +1 more source
A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces
Mabon Ninan +6 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
Side Channel Attacks vs Approximate Computing
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire +3 more sources
Electromagnetic side-channel attacks
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara +2 more
openaire +1 more source

