Results 81 to 90 of about 336,639 (325)
Side-Channel Attacks in a Real Scenario [PDF]
Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real attack methods, can only be considered to be security evaluation methods. Their limitations are mainly related to the sampling conditions, such as the trigger signal embedded in the source code of the encryption device, and the acquisition device that serves as ...
Ming Tang+6 more
openaire +2 more sources
The unrolling of the peltate leaves in Syngonium podophyllum is analyzed and quantified (left‐hand side to center). These measurements serve to verify a mathematical model for leaf unrolling based on the model used in Schmidt (2007). An additional formula for obtaining a layer mismatch from a prescribed radius is derived.
Michelle Modert+4 more
wiley +1 more source
Power analysis attack on masked AES implementation [PDF]
Šifrovací algoritmy jsou dnes běžně používaným zabezpečovacím prvkem. V některých situacích je algoritmus provozován na speciálním modulu, aby nedocházelo k útokům pomocí internetu.
Jakubíková, Radka
core
Measurement-device-independent QKD with Modified Coherent State
The measurement-device-independent quantum key distribution (MDI-QKD) protocol has been proposed for the purpose of removing the detector side channel attacks.
Chen, Wei+6 more
core +1 more source
Programmable Reconfiguration of Hybrid 4D Chiral Metamaterials via Mechanical and Thermal Stimuli
A class of hybrid chiral mechanical metamaterials is designed to achieve programmable reconfiguration through soft networks, hinges, and bilayer joints integrated with rigid units. Responsive to mechanical and thermal stimuli, these structures exhibit large volume changes, tunable deformation pathways, and both positive and negative thermal expansion ...
Yunyao Jiang, Siyao Liu, Yaning Li
wiley +1 more source
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel+3 more
core +1 more source
This work presents an overview of the PTC‐VMD system for water‐hydrogen co‐generation. a) Illustration of the hydrogel‐based PTC membrane and the co‐generation of water and hydrogen. b) Structure of the PTC‐VMD system and the functions of each component layer.
Jiawei Sun+7 more
wiley +1 more source
Side-Channel Attack on ARADI in Non-Profiling Scenarios
ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption.
Donggeun Kwon, Seokhie Hong
doaj +1 more source
This study reveals that higher shell S coordination can effectively modulate the spin state of FeN4 site via long‐range electronic interactions, giving rise to the oriented generation of singlet oxygen from peroxymonosulfate activation. Abstract Precise manipulation of coordination structure of single‐atom sites and establishment of schematic ...
Liang Zhang+8 more
wiley +1 more source
Wearable Haptic Feedback Interfaces for Augmenting Human Touch
The wearable haptic feedback interfaces enhance user experience in gaming, social media, biomedical instrumentation, and robotics by generating tactile sensations. This review discusses and categorizes current haptic feedback interfaces into force, thermal, and electrotactile stimulation‐based haptic feedback interfaces, elucidating their current ...
Shubham Patel+3 more
wiley +1 more source