Articles de revues sur le sujet « Countermeasure against Side-Channel Attacks »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Countermeasure against Side-Channel Attacks ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Jayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose, and Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks." ACM Transactions on Design Automation of Electronic Systems 26, no. 5 (2021): 1–36. http://dx.doi.org/10.1145/3443706.
Texte intégralAn, Soojung, Suhri Kim, Sunghyun Jin, HanBit Kim, and HeeSeok Kim. "Single Trace Side Channel Analysis on NTRU Implementation." Applied Sciences 8, no. 11 (2018): 2014. http://dx.doi.org/10.3390/app8112014.
Texte intégralSridhar, K. P. "Countermeasure against Side Channel Power Attacks in Cryptography Devices." Indian Journal of Science and Technology 7, is4 (2014): 15–20. http://dx.doi.org/10.17485/ijst/2014/v7sp4.7.
Texte intégralYao, Jian Bo, and Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack." Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Texte intégralDas, Debayan, and Shreyas Sen. "Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach." Cryptography 4, no. 4 (2020): 30. http://dx.doi.org/10.3390/cryptography4040030.
Texte intégralCho, Sung, Sunghyun Jin, and HeeSeok Kim. "Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure." Applied Sciences 8, no. 10 (2018): 2002. http://dx.doi.org/10.3390/app8102002.
Texte intégralBellizia, Davide, Riccardo Della Sala, and Giuseppe Scotti. "SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks." Cryptography 5, no. 3 (2021): 16. http://dx.doi.org/10.3390/cryptography5030016.
Texte intégralMukhtar, M. Asim, Maria Mushtaq, M. Khurram Bhatti, Vianney Lapotre, and Guy Gogniat. "FLUSH + PREFETCH: A countermeasure against access-driven cache-based side-channel attacks." Journal of Systems Architecture 104 (March 2020): 101698. http://dx.doi.org/10.1016/j.sysarc.2019.101698.
Texte intégralWon, Yoo-Seung, Jonghyeok Lee, and Dong-Guk Han. "Side Channel Leakages Against Financial IC Card of the Republic of Korea." Applied Sciences 8, no. 11 (2018): 2258. http://dx.doi.org/10.3390/app8112258.
Texte intégralKaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Texte intégralGhellar, Felipe, and Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks." Journal of Integrated Circuits and Systems 4, no. 1 (2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Texte intégralBucerzan, Dominic, Pierre-Louis Cayrel, Vlad Dragoi, and Tania Richmond. "Improved Timing Attacks against the Secret Permutation in the McEliece PKC." International Journal of Computers Communications & Control 12, no. 1 (2016): 7. http://dx.doi.org/10.15837/ijccc.2017.1.2780.
Texte intégralLumbiarres-Lopez, Ruben, Mariano Lopez-Garcia, and Enrique Canto-Navarro. "A new countermeasure against side-channel attacks based on hardware-software co-design." Microprocessors and Microsystems 45 (September 2016): 324–38. http://dx.doi.org/10.1016/j.micpro.2016.06.009.
Texte intégralKim, Suhri, and Seokhie Hong. "Single Trace Analysis on Constant Time CDT Sampler and Its Countermeasure." Applied Sciences 8, no. 10 (2018): 1809. http://dx.doi.org/10.3390/app8101809.
Texte intégralShang, Xinchao, Weiwei Shan, and Xinning Liu. "Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures." Journal of Circuits, Systems and Computers 27, no. 11 (2018): 1850180. http://dx.doi.org/10.1142/s0218126618501803.
Texte intégralVeshchikov, Nikita, Stephane Fernandes Medeiros, and Liran Lerman. "Variety of Scalable Shuffling Countermeasures against Side Channel Attacks." Journal of Cyber Security and Mobility 5, no. 3 (2017): 195–232. http://dx.doi.org/10.13052/jcsm2245-1439.532.
Texte intégralEldib, Hassan, Chao Wang, and Patrick Schaumont. "Formal Verification of Software Countermeasures against Side-Channel Attacks." ACM Transactions on Software Engineering and Methodology 24, no. 2 (2014): 1–24. http://dx.doi.org/10.1145/2685616.
Texte intégralLv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen, and Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks." International Journal of Foundations of Computer Science 31, no. 02 (2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.
Texte intégralSantoso, Bagus, and Yasutada Oohama. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †." Entropy 21, no. 8 (2019): 781. http://dx.doi.org/10.3390/e21080781.
Texte intégralBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu, and Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations." it - Information Technology 61, no. 1 (2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Texte intégralGao, Pengfei, Hongyi Xie, Fu Song, and Taolue Chen. "A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs." ACM Transactions on Software Engineering and Methodology 30, no. 3 (2021): 1–42. http://dx.doi.org/10.1145/3428015.
Texte intégralShin, Incheol, and Minkyoung Cho. "On Localized Countermeasure Against Reactive Jamming Attacks in Smart Grid Wireless Mesh Networks." Applied Sciences 8, no. 12 (2018): 2340. http://dx.doi.org/10.3390/app8122340.
Texte intégralImamverdiev, Ya N. "New Countermeasures Against Side-Channel Attacks for Cryptography on Elliptic Curves." Telecommunications and Radio Engineering 65, no. 10 (2006): 913–22. http://dx.doi.org/10.1615/telecomradeng.v65.i10.40.
Texte intégralBriais, Sébastien, Jean-Luc Danger, and Sylvain Guilley. "A formal study of two physical countermeasures against side channel attacks." Journal of Cryptographic Engineering 3, no. 3 (2013): 169–80. http://dx.doi.org/10.1007/s13389-013-0054-6.
Texte intégralMontaseri, Farshad, Amin Hosseinian Far, Reza Montasari, and Richard Hill. "Countermeasures for timing-based side-channel attacks against shared, modern computing hardware." International Journal of Electronic Security and Digital Forensics 11, no. 3 (2019): 294. http://dx.doi.org/10.1504/ijesdf.2019.10020551.
Texte intégralMontasari, Reza, Richard Hill, Amin Hosseinian Far, and Farshad Montaseri. "Countermeasures for timing-based side-channel attacks against shared, modern computing hardware." International Journal of Electronic Security and Digital Forensics 11, no. 3 (2019): 294. http://dx.doi.org/10.1504/ijesdf.2019.100480.
Texte intégralAsai, Toshiya, Mitsuru Shiozaki, Takaya Kubota, Takeshi Fujino, and Masaya Yoshikawa. "A Countermeasure Against Side Channel Attack on Cryptographic LSI using Clock Variation Mechanism." IEEJ Transactions on Electronics, Information and Systems 133, no. 12 (2013): 2134–42. http://dx.doi.org/10.1541/ieejeiss.133.2134.
Texte intégralYoun, Taek-Young, Nam-Su Jho, Keonwoo Kim, Ku-Young Chang, and Ki-Woong Park. "Locked Deduplication of Encrypted Data to Counter Identification Attacks in Cloud Storage Platforms." Energies 13, no. 11 (2020): 2742. http://dx.doi.org/10.3390/en13112742.
Texte intégralZhang, Shuaiwei, and Weidong Zhong. "A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–11. http://dx.doi.org/10.1155/2018/5945312.
Texte intégralYang, Binbin, Daniel Arumí, Salvador Manich, et al. "Serial RRAM Cell for Secure Bit Concealing." Electronics 10, no. 15 (2021): 1842. http://dx.doi.org/10.3390/electronics10151842.
Texte intégralDimopoulos, Charis, Apostolos P. Fournaris, and Odysseas Koufopavlou. "Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 56. http://dx.doi.org/10.3390/jsan10030056.
Texte intégralZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang, and Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure." Electronics 8, no. 2 (2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Texte intégralAerabi, Ehsan, David Hély, Cyril Bresch, Athanasios Papadimitriou, and Mahdi Fazeli. "CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes." Cryptography 5, no. 2 (2021): 13. http://dx.doi.org/10.3390/cryptography5020013.
Texte intégralJia, Hefei, Xu Liu, Xiaoqiang Di, et al. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Texte intégralKim, HanBit, Seokhie Hong, and HeeSeok Kim. "Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor." Applied Sciences 9, no. 7 (2019): 1438. http://dx.doi.org/10.3390/app9071438.
Texte intégralRen, Yan Ting, and Li Ji Wu. "A Power Analysis System for Cryptographic Devices." Advanced Materials Research 718-720 (July 2013): 2376–82. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2376.
Texte intégralKomano, Yuichi, and Shoichi Hirose. "Re-Keying Scheme Revisited: Security Model and Instantiations." Applied Sciences 9, no. 5 (2019): 1002. http://dx.doi.org/10.3390/app9051002.
Texte intégralFischer, Viktor, Florent Bernard, and Nathalie Bochard. "Modern random number generator design – Case study on a secured PLL-based TRNG." it - Information Technology 61, no. 1 (2019): 3–13. http://dx.doi.org/10.1515/itit-2018-0025.
Texte intégralGong, Yanping, Fengyu Qian, and Lei Wang. "Masked FPGA Bitstream Encryption via Partial Reconfiguration." International Journal of High Speed Electronics and Systems 28, no. 03n04 (2019): 1940022. http://dx.doi.org/10.1142/s0129156419400226.
Texte intégralDiehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, and Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers." Cryptography 2, no. 3 (2018): 26. http://dx.doi.org/10.3390/cryptography2030026.
Texte intégralAbdul-Ghani, Hezam Akram, and Dimitri Konstantas. "A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective." Journal of Sensor and Actuator Networks 8, no. 2 (2019): 22. http://dx.doi.org/10.3390/jsan8020022.
Texte intégralSimon, Laurent, Wenduan Xu, and Ross Anderson. "Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards." Proceedings on Privacy Enhancing Technologies 2016, no. 3 (2016): 136–54. http://dx.doi.org/10.1515/popets-2016-0020.
Texte intégralIsah, Abdulkadir Onivehu, John Kolo Alhassan, Idris Ismaila, and Olawale Surajudeen Adebayo. "Tracking of Malicious Attacks on Data Online: A Systematic Review." Transactions on Networks and Communications 8, no. 4 (2020): 31–44. http://dx.doi.org/10.14738/tnc.84.9463.
Texte intégralRani, Deevi Radha, and S. Venkateswarlu. "Security against Timing Analysis Attack." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (2015): 759. http://dx.doi.org/10.11591/ijece.v5i4.pp759-764.
Texte intégralSugawara, Takeshi, Natsu Shoji, Kazuo Sakiyama, Kohei Matsuda, Noriyuki Miura, and Makoto Nagata. "Side-channel leakage from sensor-based countermeasures against fault injection attack." Microelectronics Journal 90 (August 2019): 63–71. http://dx.doi.org/10.1016/j.mejo.2019.05.017.
Texte intégralZHANG, Tao, and Ming-Yu FAN. "Countermeasure for Cryptographic Chips to Resist Side-Channel Attacks." Journal of Software 19, no. 11 (2009): 2990–98. http://dx.doi.org/10.3724/sp.j.1001.2008.02990.
Texte intégralGui, Yutian, Suyash Mohan Tamore, Ali Shuja Siddiqui, and Fareena Saqib. "Key Update Countermeasure for Correlation-Based Side-Channel Attacks." Journal of Hardware and Systems Security 4, no. 3 (2020): 167–79. http://dx.doi.org/10.1007/s41635-020-00094-x.
Texte intégralBaek, Yoo-Jin. "On Non-Completeness and G-Equivariance." Applied Sciences 9, no. 21 (2019): 4692. http://dx.doi.org/10.3390/app9214692.
Texte intégralSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine, and Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks." Journal of Integrated Circuits and Systems 6, no. 1 (2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Texte intégralYu, Weize. "Hardware Trojan attacks on voltage scaling‐based side‐channel attack countermeasure." IET Circuits, Devices & Systems 13, no. 3 (2019): 321–26. http://dx.doi.org/10.1049/iet-cds.2018.5087.
Texte intégral