Artigos de revistas sobre o tema "Differential power analysis attacks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Differential power analysis attacks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Liu, Hongming, Yujie Zhou e Nianhao Zhu. "A Novel Elliptic Curve Scalar Multiplication Algorithm against Power Analysis". Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/862508.
Texto completo da fonteSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine e Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, n.º 1 (27 de dezembro de 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Texto completo da fonteWang, An, Liji Wu, Zongyue Wang, Xuexin Zheng, Man Chen e Jing Ma. "Two Improved Multiple-Differential Collision Attacks". Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/209692.
Texto completo da fonteGhellar, Felipe, e Marcelo Lubaszewski. "A Novel AES Cryptographic Core Highly Resistant to Differential Power Analysis Attacks". Journal of Integrated Circuits and Systems 4, n.º 1 (21 de novembro de 2009): 29–35. http://dx.doi.org/10.29292/jics.v4i1.294.
Texto completo da fonteMuresan, Radu, e Stefano Gregori. "Protection Circuit against Differential Power Analysis Attacks for Smart Cards". IEEE Transactions on Computers 57, n.º 11 (novembro de 2008): 1540–49. http://dx.doi.org/10.1109/tc.2008.107.
Texto completo da fonteAlioto, Massimo, Massimo Poli e Santina Rocchi. "A General Power Model of Differential Power Analysis Attacks to Static Logic Circuits". IEEE Transactions on Very Large Scale Integration (VLSI) Systems 18, n.º 5 (maio de 2010): 711–24. http://dx.doi.org/10.1109/tvlsi.2009.2015327.
Texto completo da fonteLomné, V., A. Dehbaoui, T. Ordas, P. Maurine, L. Torres, M. Robert, R. Soares, N. Calazans e F. Moraes. "Secure Triple Track Logic Robustness Against Differential Power and Electromagnetic Analyses". Journal of Integrated Circuits and Systems 4, n.º 1 (21 de novembro de 2009): 20–28. http://dx.doi.org/10.29292/jics.v4i1.293.
Texto completo da fonteMahanta, Hridoy Jyoti, e Ajoy Kumar Khan. "Improving Power Analysis Peak Distribution Using Canberra Distance to Address Ghost Peak Problem". International Journal of Information Security and Privacy 12, n.º 3 (julho de 2018): 27–41. http://dx.doi.org/10.4018/ijisp.2018070103.
Texto completo da fonteYuan, Yanling, Zuyi Li e Kui Ren. "Modeling Load Redistribution Attacks in Power Systems". IEEE Transactions on Smart Grid 2, n.º 2 (junho de 2011): 382–90. http://dx.doi.org/10.1109/tsg.2011.2123925.
Texto completo da fonteJeongChoon Ryoo, Dong-Guk Han, Sung-Kyoung Kim e Sangjin Lee. "Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods". IEEE Signal Processing Letters 15 (2008): 625–28. http://dx.doi.org/10.1109/lsp.2008.2002930.
Texto completo da fonteLo, Owen, William J. Buchanan e Douglas Carson. "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)". Journal of Cyber Security Technology 1, n.º 2 (19 de setembro de 2016): 88–107. http://dx.doi.org/10.1080/23742917.2016.1231523.
Texto completo da fonteSun, Song, Zijun Yan e Joseph Zambreno. "Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems". Integrated Computer-Aided Engineering 16, n.º 2 (20 de março de 2009): 119–30. http://dx.doi.org/10.3233/ica-2009-0309.
Texto completo da fonteMangard, S., E. Oswald e F. X. Standaert. "One for all – all for one: unifying standard differential power analysis attacks". IET Information Security 5, n.º 2 (2011): 100. http://dx.doi.org/10.1049/iet-ifs.2010.0096.
Texto completo da fonteBen Dodo, Samir, Rajendra Bishnoi e Mehdi B. Tahoori. "Secure STT-MRAM Bit-Cell Design Resilient to Differential Power Analysis Attacks". IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, n.º 1 (janeiro de 2020): 263–72. http://dx.doi.org/10.1109/tvlsi.2019.2940449.
Texto completo da fonteJayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose e Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks". ACM Transactions on Design Automation of Electronic Systems 26, n.º 5 (5 de junho de 2021): 1–36. http://dx.doi.org/10.1145/3443706.
Texto completo da fonteKaedi, S., M. Doostari e M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA". Journal of Circuits, Systems and Computers 27, n.º 12 (22 de junho de 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Texto completo da fonteZarrinchian, Ghobad, e Morteza Saheb Zamani. "Combinational Counters: A Low Overhead Approach to Address DPA Attacks". Journal of Circuits, Systems and Computers 29, n.º 06 (23 de agosto de 2019): 2050097. http://dx.doi.org/10.1142/s0218126620500978.
Texto completo da fonteXU, Kaiyong, Ming FANG, Tianchi YANG, Fanwei MENG e Huixin HUANG. "Value-at-risk quantitative method about password chip under differential power analysis attacks". Journal of Computer Applications 33, n.º 6 (29 de outubro de 2013): 1642–45. http://dx.doi.org/10.3724/sp.j.1087.2013.01642.
Texto completo da fonteMahmoud, Hanan, Khaled Alghathbar e Alaaeldin Hafez. "A Novel Stegnosystem Design for Defying Differential Power Analysis Attacks on Smart Cards". Journal of Applied Sciences 11, n.º 6 (1 de março de 2011): 1049–53. http://dx.doi.org/10.3923/jas.2011.1049.1053.
Texto completo da fonteAlioto, M., M. Poli e S. Rocchi. "Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms". IEEE Transactions on Dependable and Secure Computing 7, n.º 3 (julho de 2010): 226–39. http://dx.doi.org/10.1109/tdsc.2009.1.
Texto completo da fonteLima, Vitor Gonçalves, Guilherme Paim, Rodrigo Wuerdig, Leandro Mateus Giacomini Rocha, Leomar Da Rosa Júnior, Felipe Marques, Vinicius Valduga, Eduardo Costa, Rafael Soares e Sergio Bampi. "Enhancing Side Channel Attack-Resistance of the STTL Combining Multi-Vt Transistors with Capacitance and Current Paths Counterbalancing". Journal of Integrated Circuits and Systems 15, n.º 1 (26 de maio de 2020): 1–11. http://dx.doi.org/10.29292/jics.v15i1.100.
Texto completo da fonteRandolph, Mark, e William Diehl. "Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman". Cryptography 4, n.º 2 (19 de maio de 2020): 15. http://dx.doi.org/10.3390/cryptography4020015.
Texto completo da fonteBhat, Showkat Ahmad, e Amandeep Singh. "A Novel Image Encryption Algorithm Using Multiple Encryption Techniques for Mobile Devices". International Journal of Sensors, Wireless Communications and Control 10, n.º 2 (15 de setembro de 2020): 123–42. http://dx.doi.org/10.2174/2210327909666190408094102.
Texto completo da fonteBow, Ivan, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan Robucci, Calvin Chan e Jim Plusquellic. "Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity". Cryptography 4, n.º 2 (10 de abril de 2020): 13. http://dx.doi.org/10.3390/cryptography4020013.
Texto completo da fonteRajaram, M., e J. Vijaya. "A Defense Mechanism for Differential Power Analysis Attack in AES". Journal of Computer Science 11, n.º 2 (1 de fevereiro de 2015): 291–96. http://dx.doi.org/10.3844/jcssp.2015.291.296.
Texto completo da fonteCai, Xiaomin, Renfa Li, Shijie Kuang e Jinhui Tan. "An Energy Trace Compression Method for Differential Power Analysis Attack". IEEE Access 8 (2020): 89084–92. http://dx.doi.org/10.1109/access.2020.2993701.
Texto completo da fonteDiehl, William, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps e Kris Gaj. "Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers". Cryptography 2, n.º 3 (19 de setembro de 2018): 26. http://dx.doi.org/10.3390/cryptography2030026.
Texto completo da fonteYoung, Rachel, Stephanie Miles e Saleem Alhabash. "Attacks by Anons: A Content Analysis of Aggressive Posts, Victim Responses, and Bystander Interventions on a Social Media Site". Social Media + Society 4, n.º 1 (janeiro de 2018): 205630511876244. http://dx.doi.org/10.1177/2056305118762444.
Texto completo da fonteMohammad Kootiani, A. Zadali, e P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets". Applied Mechanics and Materials 256-259 (dezembro de 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.
Texto completo da fonteLi, Jie, Wei Wei Shan e Chao Xuan Tian. "Hamming Distance Model Based Power Analysis for Cryptographic Algorithms". Applied Mechanics and Materials 121-126 (outubro de 2011): 867–71. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.867.
Texto completo da fonteZhou, Fang, Benjun Zhang, Ning Wu e Xiangli Bu. "The Design of Compact SM4 Encryption and Decryption Circuits That Are Resistant to Bypass Attack". Electronics 9, n.º 7 (6 de julho de 2020): 1102. http://dx.doi.org/10.3390/electronics9071102.
Texto completo da fonteZhao, Jia. "RVLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack". Journal of Computer Research and Development 44, n.º 3 (2007): 378. http://dx.doi.org/10.1360/crad20070302.
Texto completo da fonteHa, Jaecheol. "Vulnerability of Carry Random Scalar Recoding Method against Differential Power Analysis Attack". Journal of the Korea Institute of Information Security and Cryptology 26, n.º 5 (31 de outubro de 2016): 1099–103. http://dx.doi.org/10.13089/jkiisc.2016.26.5.1099.
Texto completo da fontede Coo, Ilse F., Juana CA Marin, Stephen D. Silberstein, Deborah I. Friedman, Charly Gaul, Candace K. McClure, Alok Tyagi et al. "Differential efficacy of non-invasive vagus nerve stimulation for the acute treatment of episodic and chronic cluster headache: A meta-analysis". Cephalalgia 39, n.º 8 (10 de junho de 2019): 967–77. http://dx.doi.org/10.1177/0333102419856607.
Texto completo da fonteHernández-Díaz, Erick, Héctor Pérez-Meana, Víctor Silva-García e Rolando Flores-Carapia. "JPEG Images Encryption Scheme Using Elliptic Curves and A New S-Box Generated by Chaos". Electronics 10, n.º 4 (8 de fevereiro de 2021): 413. http://dx.doi.org/10.3390/electronics10040413.
Texto completo da fonteMasoumi, Massoud. "Novel Hybrid CMOS/Memristor Implementation of the AES Algorithm Robust Against Differential Power Analysis Attack". IEEE Transactions on Circuits and Systems II: Express Briefs 67, n.º 7 (julho de 2020): 1314–18. http://dx.doi.org/10.1109/tcsii.2019.2932337.
Texto completo da fonteBansod, Gaurav, Narayan Pisharoty e Abhijit Patil. "PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing". Defence Science Journal 66, n.º 3 (25 de abril de 2016): 259. http://dx.doi.org/10.14429/dsj.66.9276.
Texto completo da fonteHwang, D. D., K. Tiri, A. Hodjat, B. C. Lai, S. Yang, P. Schaumont e I. Verbauwhede. "AES-Based Security Coprocessor IC in 0.18-<tex>$muhbox m$</tex>CMOS With Resistance to Differential Power Analysis Side-Channel Attacks". IEEE Journal of Solid-State Circuits 41, n.º 4 (abril de 2006): 781–92. http://dx.doi.org/10.1109/jssc.2006.870913.
Texto completo da fonteLi, Huizhong, Yongbin Zhou, Jingdian Ming, Guang Yang e Chengbin Jin. "The Notion of Transparency Order, Revisited". Computer Journal 63, n.º 12 (3 de julho de 2020): 1915–38. http://dx.doi.org/10.1093/comjnl/bxaa069.
Texto completo da fonteArani, A. Tabatabaie, Ali Ghorbanpour Arani e Reza Kolahchi. "Non-Newtonian pulsating blood flow-induced dynamic instability of visco-carotid artery within soft surrounding visco-tissue using differential cubature method". Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 229, n.º 16 (7 de janeiro de 2015): 3002–12. http://dx.doi.org/10.1177/0954406214566038.
Texto completo da fonteZhang, Shuaiwei, e Weidong Zhong. "A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher". Wireless Communications and Mobile Computing 2018 (28 de junho de 2018): 1–11. http://dx.doi.org/10.1155/2018/5945312.
Texto completo da fonteSaber, Mohamed, e Esam Hagras. "Parallel multi-layer selector S-Box based on lorenz chaotic system with FPGA implementation". Indonesian Journal of Electrical Engineering and Computer Science 19, n.º 2 (1 de agosto de 2020): 784. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp784-792.
Texto completo da fonteZhang, Yuanyuan, Ning Wu, Fang Zhou, Jinbao Zhang e Muhammad Yahya. "A Countermeasure against DPA on SIMON with an Area-Efficient Structure". Electronics 8, n.º 2 (20 de fevereiro de 2019): 240. http://dx.doi.org/10.3390/electronics8020240.
Texto completo da fonteMatalytski, Mikhail. "ANALYSIS OF THE NETWORK WITH MULTIPLE CLASSES OF POSITIVE AND NEGATIVE CUSTOMERS AT A TRANSIENT REGIME". Probability in the Engineering and Informational Sciences 33, n.º 2 (10 de abril de 2018): 172–85. http://dx.doi.org/10.1017/s0269964818000086.
Texto completo da fonteBarabash, O., e Y. Halakhov. "RESEARCH OF THE FUNCTION OF INTENSITY OF CYBER ATTACKS USING THE DEGREE OF P-TRANSFORMATION OF ANALYTICAL FUNCTION". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n.º 66 (2019): 54–65. http://dx.doi.org/10.17721/2519-481x/2020/66-06.
Texto completo da fonteTang, Ming, ZhenLong Qiu, Si Gao, Mu Yi, ShuBo Liu, HuanGuo Zhang e YingZhen Jin. "Polar differential power attacks and evaluation". Science China Information Sciences 55, n.º 7 (20 de abril de 2012): 1588–604. http://dx.doi.org/10.1007/s11432-012-4588-5.
Texto completo da fonteUkrainczyk, Neven, Murugan Muthu, Oliver Vogt e Eddie Koenders. "Geopolymer, Calcium Aluminate, and Portland Cement-Based Mortars: Comparing Degradation Using Acetic Acid". Materials 12, n.º 19 (24 de setembro de 2019): 3115. http://dx.doi.org/10.3390/ma12193115.
Texto completo da fontePopp, Thomas, Stefan Mangard e Elisabeth Oswald. "Power Analysis Attacks and Countermeasures". IEEE Design & Test of Computers 24, n.º 6 (novembro de 2007): 535–43. http://dx.doi.org/10.1109/mdt.2007.200.
Texto completo da fontePopp, Thomas, Stefan Mangard e Elisabeth Oswald. "Power analysis attacks and countermeasures". IEEE Design & Test of Computers 24, n.º 99 (2007): x6. http://dx.doi.org/10.1109/mdt.2007.4343583.
Texto completo da fonteMatalytski, Mikhail, e Dmitry Kopats. "FINDING EXPECTED REVENUES IN G-NETWORK WITH SIGNALS AND CUSTOMERS BATCH REMOVAL". Probability in the Engineering and Informational Sciences 31, n.º 4 (25 de setembro de 2017): 561–75. http://dx.doi.org/10.1017/s0269964817000274.
Texto completo da fonte