Results 291 to 300 of about 349,795 (327)
Some of the next articles are maybe not open access.

Cache Based Side-Channel Attacks

2020
In the current era of computation, multiple processor cores are deployed in devices that range from smart-phones, laptops, desktops, servers, and cloud-based systems. Though, innovations in the world of hardware and computer architecture have resulted in faster computation in terms of better performance, a lot of sensitive data that is stored and ...
openaire   +1 more source

Side Channel Attacks and Countermeasures

2011
Side-channel attacks bypass the theoretical strength of cryptographic algorithms by exploiting weaknesses in the cryptographic system hardware implementation via nonprimary, side-channel inputs and outputs. Commonly exploited side-channel outputs include: power consumption, electromagnetic (EM) emissions, light, timing, and sound (Fig. 8.1).
openaire   +1 more source

Cancer treatment and survivorship statistics, 2022

Ca-A Cancer Journal for Clinicians, 2022
Kimberly D Miller   +2 more
exaly  

Radiation therapy‐associated toxicity: Etiology, management, and prevention

Ca-A Cancer Journal for Clinicians, 2021
Kyle Wang
exaly  

Recent progress in the treatment of cancer in children

Ca-A Cancer Journal for Clinicians, 2021
Theodore W Laetsch
exaly  

Introduction to Side-Channel Attacks

2009
Side-channel cryptanalysis is a new research area in applied cryptography that has gained more and more interest since the mid-nineties. It considers adversaries trying to take advantage of the physical specificities of actual cryptographic devices. These implementation-specific attacks frequently turn out to be much more efficient than the best known ...
openaire   +1 more source

Foundations of Side-Channel Attacks

2021
Maamar Ouladj, Sylvain Guilley
openaire   +1 more source

Cancer treatment and survivorship statistics, 2016

Ca-A Cancer Journal for Clinicians, 2016
Kimberly D Miller, Angela B Mariotto
exaly  

Home - About - Disclaimer - Privacy