-
1Academic JournalOptimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
المؤلفون: Purushottam Singh, Prashant Pranav, Sandip Dutta
المصدر: Scientific Reports, Vol 15, Iss 1, Pp 1-24 (2025)
مصطلحات موضوعية: WGAN-GP, Genetic algorithms, Side-channel attacks, Cryptographic protocols, Data augmentation, Security optimization, Medicine, Science
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
2Academic Journal
المؤلفون: Zijing Jiang, Qun Ding
المصدر: Scientific Reports, Vol 14, Iss 1, Pp 1-22 (2024)
مصطلحات موضوعية: Contrastive learning, Discrete chaotic map, Hardware trojan, Side-channel analysis, Medicine, Science
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
3
المؤلفون: Zhang, Zhimin, Ning, Huansheng, Farha, Fadi, Ding, Jianguo, 1968, Choo, Kim-Kwang Raymond
المصدر: Digital Communications and Networks. 10(3):740-755
مصطلحات موضوعية: Artificial intelligence, Biological-driven authentication, Internet of things, Physiological characteristics recognition, Data privacy, Physiology, Side channel attack, Smart cards, Authentication methods, Behavioral characteristics, Characteristic recognition, Mode-based, Personalized service, Physiological characteristic recognition, Physiological characteristics, Security datum, User authentication, Authentication
وصف الملف: electronic
-
4
المؤلفون: Moraitis, Michail, Ji, Yanning, Brisfors, Martin, Dubrova, Elena, Lindskog, Niklas, Englund, Håkan
المصدر: IEEE design & test. 41(5):7-16
مصطلحات موضوعية: CRYSTALS-Kyber, side-channel attack, countermeasure, clock randomization, duplication, deep learning, Electrical Engineering, Elektro- och systemteknik
وصف الملف: electronic
-
5Dissertation/ Thesis
المؤلفون: González Gómez, Jeferson
مصطلحات موضوعية: security, cross-layer, machine learning, attack, countermeasure, side channel, covert channel, remote attestation
وصف الملف: PDF
-
6Academic Journal
المؤلفون: Md Kawser Bepary, Tao Zhang, Farimah Farahmandi, Mark Tehranipoor
المصدر: Chips, Vol 3, Iss 4, Pp 311-333 (2024)
مصطلحات موضوعية: hardware security, side-channel analysis, pre-silicon leakage assessment, power analysis, electromagnetic analysis, security metrics, Electronic computers. Computer science, QA75.5-76.95, Electric apparatus and materials. Electric circuits. Electric networks, TK452-454.4
وصف الملف: electronic resource
-
7Academic Journal
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Side-Channel Attacks, Masking, Formal Verification, Glitch-Extended Probing Security, Reduced Ordered Binary Decision Diagrams, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
8Academic Journal
المؤلفون: Akira Ito, Rei Ueno, Naofumi Homma
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Profiled side-channel attacks, Perceived information, Success rate, Deep learning, Information theory, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
9Academic Journal
المؤلفون: Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Simple Power Attack, Modular Exponentiation, ECDSA, Constant-Time Implementation, Side-Channel Attacks, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
10Academic Journal
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Post-quantum cryptography, Code-based cryptography, Classic McEliece, Side-channel attacks, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Side-channel analysis, Software/Hardware co-analysis, Binary instrumentation, Locating of cryptographic operations, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
12Academic Journal
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Side-channel attacks, Power/Electromagnetic analysis, Unintended modulation, Phase modulation, Angle modulation, Clock jitter, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Edge TPU, Side Channel, Hyperparameter, Neural Networks, Machine Learning, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
14Academic Journal
المؤلفون: John Gaspoz, Siemen Dhooghe
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Inner Product Masking, Masking, Non-interference, Probing Security, Side-channel Analysis, Software, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
15Academic Journal
المؤلفون: Haiyue Dong, Qian Guo
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
مصطلحات موضوعية: Code-based cryptography, NIST post-quantum cryptography standardization, HQC, Side-channel attacks, KEM, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
16Academic Journal
المؤلفون: Christos Madamopoulos, Nektarios Georgios Tsoutsos
المصدر: Data in Brief, Vol 57, Iss , Pp 111002- (2024)
مصطلحات موضوعية: Side channels, Side channel attacks, Additive manufacturing, 3D printing, Cyber physical systems, Cybersecurity, Computer applications to medicine. Medical informatics, R858-859.7, Science (General), Q1-390
وصف الملف: electronic resource
-
17Academic Journal
المؤلفون: Yiwei Chen, Wenhao Li, Xiuzhen Cheng, Pengfei Hu
المصدر: High-Confidence Computing, Vol 4, Iss 4, Pp 100241- (2024)
مصطلحات موضوعية: Acoustic eavesdropping, Attack scenarios and threat models, Acoustic side-channel attacks, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
18Academic Journal
المؤلفون: Lichao Wu, Guilherme Perin, Stjepan Picek
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
مصطلحات موضوعية: Weakly profiling side-channel analysis, Profiling side-channel analysis, Non-profiling side-channel analysis, Plaintext, Ciphertext, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: Abdurrahman Nasr, Khalil Mohamed, Ayman Elshenawy, Mohamed Zaki
المصدر: Scientific Reports, Vol 14, Iss 1, Pp 1-13 (2024)
مصطلحات موضوعية: Hardware Trojan, Electromagnetic radiation, Side-channel analysis, Deep learning, Siamese neural network, Medicine, Science
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
20Academic Journal
المؤلفون: Huaxin Wang, Yiwen Gao, Yuejun Liu, Qian Zhang, Yongbin Zhou
المصدر: Cybersecurity, Vol 7, Iss 1, Pp 1-13 (2024)
مصطلحات موضوعية: CRYSTALS-Dilithium, Post-Quantum Cryptography, Correlation Power Analysis, FPGA, Side-Channel Attack, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2523-3246