Narrow your search

Library

FARO (1)

KU Leuven (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

ULB (1)

ULiège (1)

More...

Resource type

book (1)


Language

English (1)


Year
From To Submit

2019 (1)

Listing 1 - 1 of 1
Sort by

Book
Side Channel Attacks
Author:
ISBN: 3039210017 3039210009 Year: 2019 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

n/a --- binary Huff curve --- FPGA --- post quantum cryptography --- data loss --- side-channel cache attacks --- rsa cryptosystem --- first-order analysis --- chaotic circuit --- integrity --- ad libraries --- power-analysis attack --- single trace analysis --- side-channel authentication --- provable security --- ad lib --- cache misses --- cache side-channel attack --- leakage model --- NTRU --- graph --- AES --- hardware security --- recovery of secret exponent by triangular trace analysis --- side-channel attacks --- information leakage --- data outsourcing --- CPLD --- scatter-gather implementation --- modular exponentiation --- lattice-based cryptography --- elliptic curve cryptography --- Gaussian sampling --- post-quantum cryptography --- reliability --- unified point addition --- ad networks --- graph similarity --- mobile ads --- physically unclonable function --- tweakable block cipher --- Merkle (hash) tree --- machine-learning classification --- side channel attack --- online authentication --- side channel analysis --- financial IC card --- side-channel attack --- re-keying --- cloud computing --- cryptographic keys --- chaos theory --- horizontal collision correlation analysis --- countermeasure --- embedded system security --- cache attack --- single-trace attack --- software development kit (SDK) --- CDT sampling --- key bit-dependent attack --- side-channel analysis --- second-order analysis --- constant-time cryptographic algorithm --- android package (APK) --- challenge-response authentication

Listing 1 - 1 of 1
Sort by