Zobrazeno 1 - 10
of 19
pro vyhledávání: '"attack evaluation"'
Publikováno v:
Mathematics, Vol 12, Iss 15, p 2355 (2024)
In recent years, side-channel analysis based on deep learning has garnered significant attention from researchers. A pivotal reason for this lies in the fact that deep learning-based side-channel analysis requires minimal preprocessing of side-channe
Externí odkaz:
https://doaj.org/article/d7e90dce3eef4e34af8f3ae25a6f854a
Autor:
Keerthi K, Chester Rebeiro
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
Fault attacks are a potent class of physical attacks that exploit a fault njected during device operation to steal secret keys from a cryptographic device. The success of a fault attack depends intricately on (a) the cryptographic properties of the c
Externí odkaz:
https://doaj.org/article/a6ee2e8d66144071bc4f509bc9c5276c
Autor:
Mahdee, Jodayree
Federated learning has gained attention recently for its ability to protect data privacy and distribute computing loads [1]. It overcomes the limitations of traditional machine learning algorithms by allowing computers to train on remote data inputs
Externí odkaz:
http://hdl.handle.net/11375/29304
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds. Software implem
Externí odkaz:
https://doaj.org/article/54468c4d166740ef8fe8ed4b82479997
Publikováno v:
Information, Vol 11, Iss 11, p 537 (2020)
The rapid move to digitalization and usage of online information systems brings new and evolving threats that organizations must protect themselves from and respond to. Monitoring an organization’s network for malicious activity has become a standa
Externí odkaz:
https://doaj.org/article/1f1bde886a13434dae307150f0c328de
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 17:249-263
When designing Wireless Sensor Networks it is important to analyze their security risks and provide adequate solutions for protecting them from malicious attacks. Unfortunately, perfect security cannot be achieved, for performance reasons. Therefore,
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020)
Fault injection attacks are one of the most powerful forms of cryptanalytic attacks on ciphers. A single, precisely injected fault during the execution of a cipher like the AES, can completely reveal the key within a few milliseconds. Software implem
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.