Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Side-Channel Attacks
Improving Non-Profiled Attacks on Exponentiations Based on Clustering and Extracting Leakage from Multi-Channel High-Resolution EM Measurements
Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis)
Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits
Exploring the Resilience of Some Lightweight Ciphers Against Profiled Single Trace Attacks
Two Operands of Multipliers in Side-Channel Attack
FPGA Countermeasures
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware
Timing Attacks and Countermeasures
A Faster and More Realistic Flush+Reload Attack on AES
Faster software for fast endomorphisms
Toward Secure Implementation of McEliece Decryption
Fault Attacks
Fault Injection with a new favor: Memetic Algorithms make a difference
Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers
A Biased Fault Attack on the Time Redundancy Countermeasure for AES
Countermeasures
Faster Mask Conversion with Lookup Tables
Towards Evaluating DPA Countermeasures for Keccak on a Real ASIC
Hands-on Side-Channel Analysis Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment.

Browse Subjects

Show more subjects...

Statistics

from
to
Export