Loading…
Deep learning for side-channel analysis and introduction to ASCAD database
Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi, Cagli, Eleonora, Dumas, Cécile
Published in Journal of cryptographic engineering (01.06.2020)
Published in Journal of cryptographic engineering (01.06.2020)
Get full text
Journal Article
Loading…
Constructive Side-Channel Analysis and Secure Design: 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings
Year of Publication 2022
Get full text
Conference Proceeding
Loading…
Constructive Side-Channel Analysis and Secure Design: 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021, Proceedings
Year of Publication 2021
Get full text
Conference Proceeding
Loading…
Electromagnetic side channel analysis of laser facsimile
Yanyun Xu, Jianlin Hu, Meng Zhang, Weiqing Huang
Published in IEEE International Conference on Communications (2003) (01.05.2017)
Published in IEEE International Conference on Communications (2003) (01.05.2017)
Get full text
Conference Proceeding
Loading…
Transparent Transformations for Timing Side-Channel Analysis
Arranz-Olmos, Santiago, Barthe, Gilles, Blatter, Lionel, van der Wall, Sören, Zhang, Zhiyuan
Year of Publication 07.01.2025
Year of Publication 07.01.2025
Get full text
Journal Article
Loading…
Loading…
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Barredo, Jorge, Eceiza, Maialen, Flores, Jose Luis, Iturbe, Mikel
Published in International journal of information security (01.08.2025)
Published in International journal of information security (01.08.2025)
Get full text
Journal Article
Loading…
Side-channel analysis of SEcube™ platform
Bollo, Matteo, Carelli, Alberto, Di Carlo, Stefano, Prinetto, Paolo
Published in East-West Design and Test Symposium (01.09.2017)
Published in East-West Design and Test Symposium (01.09.2017)
Get full text
Conference Proceeding
Loading…
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics
Guilley, Sylvain, Sauvage, Laurent, Flament, Florent, Vinh-Nga Vong, Hoogvorst, Philippe, Pacalet, Renaud
Published in IEEE transactions on computers (01.09.2010)
Published in IEEE transactions on computers (01.09.2010)
Get full text
Journal Article
Loading…
Loading…
Enhanced side-channel analysis method to detect hardware virtualization based rootkits
Kyte, I., Zavarsky, P., Lindskog, D., Ruhl, R.
Published in 2012 World Congress on Internet Security (01.06.2012)
Get full text
Published in 2012 World Congress on Internet Security (01.06.2012)
Conference Proceeding
Loading…
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher
Gunathilake, Nilupulee A., Al-Dubai, Ahmed, Buchanan, William J., Lo, Owen
Published in 2022 6th International Conference on Cryptography, Security and Privacy (CSP) (01.01.2022)
Published in 2022 6th International Conference on Cryptography, Security and Privacy (CSP) (01.01.2022)
Get full text
Conference Proceeding
Loading…
Electromagnetic analysis and fault injection onto secure circuits
Maistri, P., Leveugle, R., Bossuet, L., Aubert, A., Fischer, V., Robisson, B., Moro, N., Maurine, P., Dutertre, J.-M, Lisart, M.
Published in IEEE/IFIP ... International Conference on VLSI and System-on-Chip (Print) (01.10.2014)
Published in IEEE/IFIP ... International Conference on VLSI and System-on-Chip (Print) (01.10.2014)
Get full text
Conference Proceeding
Loading…
Loading…