Results 291 to 300 of about 349,795 (327)
Some of the next articles are maybe not open access.
Cache Based Side-Channel Attacks
2020In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire +1 more source
Side Channel Attacks and Countermeasures
2011Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire +1 more source
Cancer treatment and survivorship statistics, 2022
Ca-A Cancer Journal for Clinicians, 2022Kimberly D Miller +2 more
exaly
Radiation therapy‐associated toxicity: Etiology, management, and prevention
Ca-A Cancer Journal for Clinicians, 2021Kyle Wang
exaly
Recent progress in the treatment of cancer in children
Ca-A Cancer Journal for Clinicians, 2021Theodore W Laetsch
exaly
Introduction to Side-Channel Attacks
2009Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire +1 more source
Cancer treatment and survivorship statistics, 2016
Ca-A Cancer Journal for Clinicians, 2016Kimberly D Miller, Angela B Mariotto
exaly

