Articles with "side channel" as a keyword



Photo from wikipedia

Effects of the geometrical conditions on the performance of a side channel pump: A review

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Energy Research"

DOI: 10.1002/er.3803

Abstract: Summary The side channel pump, which is a common energy conversion equipment, has undergone high developmental trends and has become very popular in recent times because of its wide applications in many fields. The side… read more here.

Keywords: pump; side channel; channel pump; performance ... See more keywords
Photo from wikipedia

Differential audio analysis: a new side-channel attack on PIN pads

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Information Security"

DOI: 10.1007/s10207-018-0403-7

Abstract: This paper introduces a low-cost side-channel attack that identifies the pressed key of tamper-proof mechanical keypads by exploiting the sound that emanates from the pressed key. Classical sound-based attacks usually identify the pressed key using… read more here.

Keywords: attack; pin pads; side channel; channel attack ... See more keywords
Photo by kazuend from unsplash

Landscape assessment of side channel plugs and associated cumulative side channel attrition across a large river floodplain

Sign Up to like & get
recommendations!
Published in 2018 at "Environmental Monitoring and Assessment"

DOI: 10.1007/s10661-018-6673-8

Abstract: Determining the influences of anthropogenic perturbations on side channel dynamics in large rivers is important from both assessment and monitoring perspectives because side channels provide critical habitat to numerous aquatic species. Side channel extents are… read more here.

Keywords: river; attrition; channel; side channel ... See more keywords
Photo by pawel_czerwinski from unsplash

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-019-1961-5

Abstract: Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise… read more here.

Keywords: authentication; cellular networks; protocols cdma; side channel ... See more keywords
Photo by sharonmccutcheon from unsplash

A Way to Improve the Key Recovery Accuracy Based on Dynamic Programming

Sign Up to like & get
recommendations!
Published in 2018 at "Wuhan University Journal of Natural Sciences"

DOI: 10.1007/s11859-018-1359-1

Abstract: Key-recovery technology is often used by an adversary to attempt to recover the cryptographic key of an encryption scheme. The most obvious key-recovery attack is the exhaustive key-search attack. But modern ciphers often have a… read more here.

Keywords: attack; recovery; way improve; side channel ... See more keywords
Photo by hakannural from unsplash

Statistical properties of side-channel and fault injection attacks using coding theory

Sign Up to like & get
recommendations!
Published in 2017 at "Cryptography and Communications"

DOI: 10.1007/s12095-017-0271-4

Abstract: Naïve implementation of block ciphers are subject to side-channel and fault injection attacks. To deceive side-channel attacks and to detect fault injection attacks, the designer inserts specially crafted error correcting codes in the implementation. The… read more here.

Keywords: side channel; injection attacks; fault injection; channel fault ... See more keywords
Photo by nampoh from unsplash

Quiescent photonics side channel analysis: Low cost SRAM readout attack

Sign Up to like & get
recommendations!
Published in 2021 at "Cryptography and Communications"

DOI: 10.1007/s12095-020-00469-5

Abstract: Optical emissions from semiconductors have been found to leak important information from embedded security devices. Unfortunately, the required substrate thinning and photon emission microscopy equipment is typically very expensive. Low cost equipment setups are proposed… read more here.

Keywords: attack; quiescent photonics; microscopy; side channel ... See more keywords
Photo by the_average_tech_guy from unsplash

AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01770-0

Abstract: Due to the advancement in technologies and excessive usability of smartphones in various domains (e.g., mobile banking), smartphones became more prone to malicious attacks.Typing on the soft keyboard of a smartphone produces different vibrations, which… read more here.

Keywords: smartphone; detecting motion; alphalogger detecting; soft keyboard ... See more keywords
Photo from wikipedia

Energy loss evaluation in a side channel pump under different wrapping angles using entropy production method

Sign Up to like & get
recommendations!
Published in 2020 at "International Communications in Heat and Mass Transfer"

DOI: 10.1016/j.icheatmasstransfer.2020.104526

Abstract: Abstract Flow losses in common vanned pumps such as centrifugal pumps have been widely studied, while less research attention has been paid to side channel pumps that are commonly used in the food processing and… read more here.

Keywords: energy; channel pump; channel; side channel ... See more keywords
Photo from wikipedia

The dark side of channel rewards for observer distributors: A social comparison perspective

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Business Research"

DOI: 10.1016/j.jbusres.2021.04.046

Abstract: Abstract Existing research has primarily investigated the bright side of channel rewards, such as gaining distributors’ positive feedback and/or to avoid their negative responses. While acknowledging the potential negative effects of channel rewards, few studies… read more here.

Keywords: social comparison; side channel; dark side; channel rewards ... See more keywords
Photo by googledeepmind from unsplash

Deep learning side-channel attack against hardware implementations of AES

Sign Up to like & get
recommendations!
Published in 2020 at "Microprocessors and Microsystems"

DOI: 10.1016/j.micpro.2020.103383

Abstract: Abstract In the field of image recognition, machine learning technologies, especially deep learning, have been rapidly advancing alongside the advances of hardware such as GPUs. In image recognition, in general, large numbers of labeled images… read more here.

Keywords: network; deep learning; hardware; channel ... See more keywords