Journal articles on the topic 'Countermeasure against Side-Channel Attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Countermeasure against Side-Channel Attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose, and Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks." ACM Transactions on Design Automation of Electronic Systems 26, no. 5 (2021): 1–36. http://dx.doi.org/10.1145/3443706.
Full textAn, Soojung, Suhri Kim, Sunghyun Jin, HanBit Kim, and HeeSeok Kim. "Single Trace Side Channel Analysis on NTRU Implementation." Applied Sciences 8, no. 11 (2018): 2014. http://dx.doi.org/10.3390/app8112014.
Full textSridhar, K. P. "Countermeasure against Side Channel Power Attacks in Cryptography Devices." Indian Journal of Science and Technology 7, is4 (2014): 15–20. http://dx.doi.org/10.17485/ijst/2014/v7sp4.7.
Full textYao, Jian Bo, and Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack." Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Full textDas, Debayan, and Shreyas Sen. "Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach." Cryptography 4, no. 4 (2020): 30. http://dx.doi.org/10.3390/cryptography4040030.
Full textCho, Sung, Sunghyun Jin, and HeeSeok Kim. "Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure." Applied Sciences 8, no. 10 (2018): 2002. http://dx.doi.org/10.3390/app8102002.
Full textBellizia, Davide, Riccardo Della Sala, and Giuseppe Scotti. "SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks." Cryptography 5, no. 3 (2021): 16. http://dx.doi.org/10.3390/cryptography5030016.
Full textMukhtar, M. Asim, Maria Mushtaq, M. Khurram Bhatti, Vianney Lapotre, and Guy Gogniat. "FLUSH + PREFETCH: A countermeasure against access-driven cache-based side-channel attacks." Journal of Systems Architecture 104 (March 2020): 101698. http://dx.doi.org/10.1016/j.sysarc.2019.101698.
Full textWon, Yoo-Seung, Jonghyeok Lee, and Dong-Guk Han. "Side Channel Leakages Against Financial IC Card of the Republic of Korea." Applied Sciences 8, no. 11 (2018): 2258. http://dx.doi.org/10.3390/app8112258.
Full textKaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Full textGhellar, Felipe, and Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks." Journal of Integrated Circuits and Systems 4, no. 1 (2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Full textBucerzan, Dominic, Pierre-Louis Cayrel, Vlad Dragoi, and Tania Richmond. "Improved Timing Attacks against the Secret Permutation in the McEliece PKC." International Journal of Computers Communications & Control 12, no. 1 (2016): 7. http://dx.doi.org/10.15837/ijccc.2017.1.2780.
Full textLumbiarres-Lopez, Ruben, Mariano Lopez-Garcia, and Enrique Canto-Navarro. "A new countermeasure against side-channel attacks based on hardware-software co-design." Microprocessors and Microsystems 45 (September 2016): 324–38. http://dx.doi.org/10.1016/j.micpro.2016.06.009.
Full textKim, Suhri, and Seokhie Hong. "Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure." Applied Sciences 8, no. 10 (2018): 1809. http://dx.doi.org/10.3390/app8101809.
Full textShang, Xinchao, Weiwei Shan, and Xinning Liu. "Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures." Journal of Circuits, Systems and Computers 27, no. 11 (2018): 1850180. http://dx.doi.org/10.1142/s0218126618501803.
Full textVeshchikov, Nikita, Stephane Fernandes Medeiros, and Liran Lerman. "Variety of Scalable Shuffling Countermeasures against Side Channel Attacks." Journal of Cyber Security and Mobility 5, no. 3 (2017): 195–232. http://dx.doi.org/10.13052/jcsm2245-1439.532.
Full textEldib, Hassan, Chao Wang, and Patrick Schaumont. "Formal Verification of Software Countermeasures against Side-Channel Attacks." ACM Transactions on Software Engineering and Methodology 24, no. 2 (2014): 1–24. http://dx.doi.org/10.1145/2685616.
Full textLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen, and Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks." International Journal of Foundations of Computer Science 31, no. 02 (2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Full textSantoso, Bagus, and Yasutada Oohama. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †." Entropy 21, no. 8 (2019): 781. http://dx.doi.org/10.3390/e21080781.
Full textBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu, and Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations." it - Information Technology 61, no. 1 (2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Full textGao, Pengfei, Hongyi Xie, Fu Song, and Taolue Chen. "A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs." ACM Transactions on Software Engineering and Methodology 30, no. 3 (2021): 1–42. http://dx.doi.org/10.1145/3428015.
Full textShin, Incheol, and Minkyoung Cho. "On Localized Countermeasure Against Reactive Jamming Attacks in Smart Grid Wireless Mesh Networks." Applied Sciences 8, no. 12 (2018): 2340. http://dx.doi.org/10.3390/app8122340.
Full textImamverdiev, Ya N. "New Countermeasures Against Side-Channel Attacks for Cryptography on Elliptic Curves." Telecommunications and Radio Engineering 65, no. 10 (2006): 913–22. http://dx.doi.org/10.1615/telecomradeng.v65.i10.40.
Full textBriais, Sébastien, Jean-Luc Danger, and Sylvain Guilley. "A formal study of two physical countermeasures against side channel attacks." Journal of Cryptographic Engineering 3, no. 3 (2013): 169–80. http://dx.doi.org/10.1007/s13389-013-0054-6.
Full textMontaseri, Farshad, Amin Hosseinian Far, Reza Montasari, and Richard Hill. "Countermeasures for timing-based side-channel attacks against shared, modern computing hardware." International Journal of Electronic Security and Digital Forensics 11, no. 3 (2019): 294. http://dx.doi.org/10.1504/ijesdf.2019.10020551.
Full textMontasari, Reza, Richard Hill, Amin Hosseinian Far, and Farshad Montaseri. "Countermeasures for timing-based side-channel attacks against shared, modern computing hardware." International Journal of Electronic Security and Digital Forensics 11, no. 3 (2019): 294. http://dx.doi.org/10.1504/ijesdf.2019.100480.
Full textAsai, Toshiya, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino, and Masaya Yoshikawa. "A Countermeasure Against Side Channel Attack on Cryptographic LSI using Clock Variation Mechanism." IEEJ Transactions on Electronics, Information and Systems 133, no. 12 (2013): 2134–42. http://dx.doi.org/10.1541/ieejeiss.133.2134.
Full textYoun, Taek-Young, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, and Ki-Woong Park. "Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms." Energies 13, no. 11 (2020): 2742. http://dx.doi.org/10.3390/en13112742.
Full textZhang, Shuaiwei, and Weidong Zhong. "A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–11. http://dx.doi.org/10.1155/2018/5945312.
Full textYang, Binbin, Daniel Arumí, Salvador Manich, et al. "Serial RRAM Cell for Secure Bit Concealing." Electronics 10, no. 15 (2021): 1842. http://dx.doi.org/10.3390/electronics10151842.
Full textDimopoulos, Charis, Apostolos P. Fournaris, and Odysseas Koufopavlou. "Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 56. http://dx.doi.org/10.3390/jsan10030056.
Full textZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang, and Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure." Electronics 8, no. 2 (2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Full textAerabi, Ehsan, David Hély, Cyril Bresch, Athanasios Papadimitriou, and Mahdi Fazeli. "CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes." Cryptography 5, no. 2 (2021): 13. http://dx.doi.org/10.3390/cryptography5020013.
Full textJia, Hefei, Xu Liu, Xiaoqiang Di, et al. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Full textKim, HanBit, Seokhie Hong, and HeeSeok Kim. "Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor." Applied Sciences 9, no. 7 (2019): 1438. http://dx.doi.org/10.3390/app9071438.
Full textRen, Yan Ting, and Li Ji Wu. "A Power Analysis System for Cryptographic Devices." Advanced Materials Research 718-720 (July 2013): 2376–82. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2376.
Full textKomano, Yuichi, and Shoichi Hirose. "Re-Keying Scheme Revisited: Security Model and Instantiations." Applied Sciences 9, no. 5 (2019): 1002. http://dx.doi.org/10.3390/app9051002.
Full textFischer, Viktor, Florent Bernard, and Nathalie Bochard. "Modern random number generator design – Case study on a secured PLL-based TRNG." it - Information Technology 61, no. 1 (2019): 3–13. http://dx.doi.org/10.1515/itit-2018-0025.
Full textGong, Yanping, Fengyu Qian, and Lei Wang. "Masked FPGA Bitstream Encryption via Partial Reconfiguration." International Journal of High Speed Electronics and Systems 28, no. 03n04 (2019): 1940022. http://dx.doi.org/10.1142/s0129156419400226.
Full textDiehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers." Cryptography 2, no. 3 (2018): 26. http://dx.doi.org/10.3390/cryptography2030026.
Full textAbdul-Ghani, Hezam Akram, and Dimitri Konstantas. "A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective." Journal of Sensor and Actuator Networks 8, no. 2 (2019): 22. http://dx.doi.org/10.3390/jsan8020022.
Full textSimon, Laurent, Wenduan Xu, and Ross Anderson. "Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards." Proceedings on Privacy Enhancing Technologies 2016, no. 3 (2016): 136–54. http://dx.doi.org/10.1515/popets-2016-0020.
Full textIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Full textRani, Deevi Radha, and S. Venkateswarlu. "Security against Timing Analysis Attack." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (2015): 759. http://dx.doi.org/10.11591/ijece.v5i4.pp759-764.
Full textSugawara, Takeshi, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata. "Side-channel leakage from sensor-based countermeasures against fault injection attack." Microelectronics Journal 90 (August 2019): 63–71. http://dx.doi.org/10.1016/j.mejo.2019.05.017.
Full textZHANG, Tao, and Ming-Yu FAN. "Countermeasure for Cryptographic Chips to Resist Side-Channel Attacks." Journal of Software 19, no. 11 (2009): 2990–98. http://dx.doi.org/10.3724/sp.j.1001.2008.02990.
Full textGui, Yutian, Suyash Mohan Tamore, Ali Shuja Siddiqui, and Fareena Saqib. "Key Update Countermeasure for Correlation-Based Side-Channel Attacks." Journal of Hardware and Systems Security 4, no. 3 (2020): 167–79. http://dx.doi.org/10.1007/s41635-020-00094-x.
Full textBaek, Yoo-Jin. "On Non-Completeness and G-Equivariance." Applied Sciences 9, no. 21 (2019): 4692. http://dx.doi.org/10.3390/app9214692.
Full textSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, and Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks." Journal of Integrated Circuits and Systems 6, no. 1 (2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Full textYu, Weize. "Hardware Trojan attacks on voltage scaling‐based side‐channel attack countermeasure." IET Circuits, Devices & Systems 13, no. 3 (2019): 321–26. http://dx.doi.org/10.1049/iet-cds.2018.5087.
Full text