-
1
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: Get full text
Article -
2
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
3
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
4
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
5
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
6
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: Get full text
Article -
7
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01Subjects: “…side-channel defense…”
Get full text
Article -
8
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
9
-
10
Improved fast leakage assessment based on online counting
Published 2021-04-01Subjects: Get full text
Article -
11
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
12
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: Get full text
Article -
13
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01Subjects: Get full text
Article -
14
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
15
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: “…side channel attack…”
Get full text
Article -
16
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
17
Chosen message attacks method against ECC implementations
Published 2014-05-01Subjects: Get full text
Article -
18
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
19
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
20
Hardware Trojans detection based on projection pursuit
Published 2013-04-01Subjects: Get full text
Article