Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Soroor Ghandali"'
Publikováno v:
IEEE Access, Vol 9, Pp 136448-136458 (2021)
The appearance of deep neural networks for Side-Channel leads to strong power analysis techniques for detecting secret information of physical cryptography implementations. Generally, deep learning techniques do not suffer the difficulties of templat
Externí odkaz:
https://doaj.org/article/e6e7f73a39d747908ef49d2f3abdecfb
Publikováno v:
Cryptography, Vol 5, Iss 1, p 7 (2021)
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inh
Externí odkaz:
https://doaj.org/article/6c8e68db2cc747e9a7cd90e173561b3c
Publikováno v:
IEEE Access, Vol 9, Pp 136448-136458 (2021)
The appearance of deep neural networks for Side-Channel leads to strong power analysis techniques for detecting secret information of physical cryptography implementations. Generally, deep learning techniques do not suffer the difficulties of templat
Publikováno v:
ISQED
In a recent line of works, several masking and unmasking AES design have been proposed to secure hardware implementations against power-analysis techniques. Although Machine-learning profiling techniques have been successful in security testing durin
Publikováno v:
Cryptography, Vol 5, Iss 7, p 7 (2021)
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inh
This book is a compendium of various applications and current progress in a powerful technology known as the Internet of Things (IoT). IoT provides a system of interconnecting things such as vehicles, electrical equipment, agriculture devices, etc. S