-
1
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
Published 2025-01-01Subjects: Get full text
Article -
2
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: “…cryptanalysis;side channel attacks;differential fault analysis;SMS4…”
Get full text
Article -
3
A survey of acoustic eavesdropping attacks: Principle, methods, and progress
Published 2024-12-01Subjects: Get full text
Article -
4
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
Published 2025-07-01Subjects: Get full text
Article -
5
Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks
Published 2024-01-01Subjects: Get full text
Article -
6
The Quest for Efficient ASCON Implementations: A Comprehensive Review of Implementation Strategies and Challenges
Published 2025-04-01Subjects: Get full text
Article -
7
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
8
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: Get full text
Article -
9
Beyond encryption: How deep learning can break microcontroller security through power analysis
Published 2025-03-01Subjects: Get full text
Article -
10
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01Subjects: “…side-channel attacks…”
Get full text
Article -
11
Perceived Information Revisited II
Published 2024-12-01Subjects: “…Profiled side-channel attacks…”
Get full text
Article -
12
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Published 2024-12-01Subjects: Get full text
Article -
13
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Published 2024-12-01Subjects: Get full text
Article -
14
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Published 2024-12-01Subjects: Get full text
Article -
15
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
16
A Side-Channel Protected and High-Performance Hardware Implementation for EdDSA25519
Published 2025-01-01Subjects: Get full text
Article -
17
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
Published 2024-12-01Subjects: “…Side-channel attacks…”
Get full text
Article -
18
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder
Published 2025-06-01Subjects: “…Side-Channel Attacks…”
Get full text
Article -
19
R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 With Built-In Attack-on-Countermeasure Detection
Published 2025-01-01Subjects: Get full text
Article -
20
Secure Scan Architecture for Enhanced Testability and Resistance Against Side-Channel Attacks in Cryptographic ICs
Published 2025-01-01Subjects: Get full text
Article