-
1
Prexion: Probabilistic Matching-Based Compression to Mitigate Compression Side Channel Attacks Against HTTPS
Published 2025-01-01Subjects: Get full text
Article -
2
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
3
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
4
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Published 2025-07-01Subjects: Get full text
Article -
5
A Code-Based ISE to Protect Boolean Masking in Software
Published 2025-03-01Subjects: “…side-channel attack…”
Get full text
Article -
6
Research on side-channel attacks and defense methods for IoT devices
Published 2025-02-01Subjects: Get full text
Article -
7
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
8
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: “…information security;side-channel attack;NAF;SPA;balance power consumption…”
Get full text
Article -
9
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: “…modular exponentiation;side-channel attack;simple power analysis;Montgomery algorithm…”
Get full text
Article -
10
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
11
Side-Channel Attack on ARADI in Non-Profiling Scenarios
Published 2025-01-01Subjects: Get full text
Article -
12
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
13
A Hybrid Equalizer for Protection of 1st-Order Delta-Sigma Modulator Against Side-Channel Attack
Published 2024-01-01Subjects: Get full text
Article -
14
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
15
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article -
16
A Novel Architecture of Masked Logic Cells for Side-Channel Attacks
Published 2024-02-01Subjects: Get full text
Article -
17
Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses
Published 2025-01-01Subjects: Get full text
Article -
18
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01Subjects: “…side channel attack…”
Get full text
Article -
19
All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions
Published 2025-06-01Subjects: “…Higher-order side-channel attack…”
Get full text
Article -
20
Evaluating the Vulnerability of Hiding Techniques in Cyber-Physical Systems Against Deep Learning-Based Side-Channel Attacks
Published 2025-06-01Subjects: “…side-channel attack…”
Get full text
Article