-
1
Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule
Published 2008-01-01Subjects: Get full text
Article -
2
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: Get full text
Article -
3
A Low-Overhead and High-Security Scan Design Based on Scan Obfuscation
Published 2024-01-01Subjects: Get full text
Article -
4
Research on dynamic migration of critical virtual machines for multi-tenancy
Published 2017-08-01Subjects: “…side-channel attacks…”
Get full text
Article -
5
Improvement of equivalent power consumption coding secure against power analysis attacks
Published 2010-01-01Subjects: Get full text
Article -
6
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
7
Template attack of Crypto chip based on clustering
Published 2018-08-01Subjects: “…side channel attack…”
Get full text
Article -
8
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
9
Network slicing deployment method based on isolation level
Published 2020-04-01Subjects: Get full text
Article -
10
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
11
Survey of side channel attack on encrypted network traffic
Published 2021-08-01Subjects: Get full text
Article -
12
Simple power analysis attack against cryptosystems based on Montgomery algorithm
Published 2013-08-01Subjects: Get full text
Article -
13
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01Subjects: Get full text
Article -
14
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01Subjects: Get full text
Article -
15
Mutual information power analysis attack in the frequency domain of the crypto chip
Published 2015-11-01Subjects: “…side-channel attack…”
Get full text
Article -
16
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: “…side channel attack…”
Get full text
Article -
17
Security control scheme for cloud data copy based on differential privacy model
Published 2017-05-01Subjects: Get full text
Article -
18
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
19
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01Subjects: Get full text
Article -
20
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01Subjects: Get full text
Article