-
1
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
2
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
3
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
4
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
5
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
6
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
7
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: Get full text
Article -
8
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01Subjects: Get full text
Article -
9
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
10
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: “…side channel attack…”
Get full text
Article -
11
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
12
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
13
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
14
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article -
15
Side channel attack of cipher chips based on difference variability
Published 2015-03-01Subjects: Get full text
Article -
16
-
17
Research on dynamic migration of virtual machine based on security level
Published 2017-07-01Subjects: “…side-channel attack…”
Get full text
Article -
18
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01Subjects: “…side channel attack…”
Get full text
Article -
19
Side channel leakage assessment with the Bartlett and multi-classes F-test
Published 2021-12-01Subjects: Get full text
Article -
20
Dynamic migration method of key virtual network function based on risk awareness
Published 2020-04-01Subjects: Get full text
Article