Linked e-resources

Details

Convolutional Neural Network based Side-Channel Attacks in Time-Frequency Representations.- A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.- Improving Side-channel Analysis through Semi-supervised Learning.- Non-profiled Mask Recovery: the impact of Independent Component Analysis.- How (not) to Use Welch's T-test in Side-Channel Security Evaluations.- Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys.- Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.- Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication.- Jitter Estimation with High Accuracy for Oscillator-Based TRNGs.- Electromagnetic Activity vs. Logical Activity : Near Field Scans for Reverse Engineering.- An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.- Breaking all the Things
A Systematic Survey of Firmware Extraction Techniques for IoT Devices.- Exploiting JCVM on smart cards using forged references in the API calls.

Browse Subjects

Show more subjects...

Statistics

from
to
Export