Zobrazeno 1 - 10
of 832
pro vyhledávání: '"Timing attack"'
Publikováno v:
IEEE Access, Vol 10, Pp 82540-82559 (2022)
Due to changing software requirements and increasing system complexity, which put forward new challenges to the related testing processes to ensure software trustworthiness. Software testing is an important means to improve software quality, and stan
Externí odkaz:
https://doaj.org/article/9e148e3f67fb48339487d91259c1acce
Autor:
Kalidasan, Vishnu Kumar
Cache side-channel attacks have evolved alongside increasingly complex microprocessor architectural designs. The attacks and their prevention mechanisms, such as cache partitioning, OS kernel isolation, and various hardware/operating system enhanceme
Externí odkaz:
https://hdl.handle.net/10919/119312
Autor:
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 3 (2022)
Well before large-scale quantum computers will be available, traditional cryptosystems must be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to standardize suitable cryptographic schemes. Candidates are evaluated not
Externí odkaz:
https://doaj.org/article/ba9ed2fab6934332817b7933c1416030
Publikováno v:
IEEE Access, Vol 8, Pp 145803-145823 (2020)
Named Data Network (NDN) is a network paradigm that attempts to answer today's needs for distribution. One of the NDN key features is in-network caching to increase content distribution and network efficiency. However, this feature may increase the p
Externí odkaz:
https://doaj.org/article/c3891d1397764fa883565a9c81211a2e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______4198::8b44343840890b69a7a58291c13657f5
http://hdl.handle.net/20.500.12210/84064
http://hdl.handle.net/20.500.12210/84064
Publikováno v:
Workshop on Information Hiding and Multimedia Security
Workshop on Information Hiding and Multimedia Security, ACM, Jun 2023, Chicago, United States. ⟨10.1145/3577163.3595093⟩
Workshop on Information Hiding and Multimedia Security, ACM, Jun 2023, Chicago, United States. ⟨10.1145/3577163.3595093⟩
This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::72dc17d4956b7eca94e7f838c64efaf1
http://arxiv.org/abs/2306.01317
http://arxiv.org/abs/2306.01317
Publikováno v:
IEEE Embedded Systems Letters. 14:71-74
Publikováno v:
Journal of Information Warfare, 2016 Jan 01. 15(1), 104-114.
Externí odkaz:
https://www.jstor.org/stable/26487484