Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Side-channel attack
biblio
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem
Submitted by grigby1 on Thu, 08/03/2023 - 1:57pm
encryption
pubcrawl
Metrics
resilience
Resiliency
NIST
composability
side-channel attacks
Decoding
Public key
Side-channel attack
Post-quantum cryptography
semiconductor lasers
Encapsulation
syndrome decoding problem
Forward Error Encryption
biblio
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH
Submitted by aekwall on Fri, 03/03/2023 - 10:59am
Correlation
mask
lightweigth block cipher
FESH
correlation power analysis
Lightweight Ciphers
Side-channel attack
Power measurement
Costs
Resists
Random access memory
cyber-physical systems
Ciphers
Resiliency
Scalability
pubcrawl
Conferences
biblio
Tamper-Resistant Optical Logic Circuits Based on Integrated Nanophotonics
Submitted by aekwall on Thu, 05/19/2022 - 1:41pm
Human Factors
Integrated optics
logic circuits
Logic gates
Metrics
nanophotonics
Optical computing
Optical design
Optical detectors
pubcrawl
Resistance
Scalability
security
Side-channel attack
Tamper resistance
Tamper-Resistance
biblio
Prevent Data Exfiltration on Smart Phones Using Audio Distortion and Machine Learning
Submitted by grigby1 on Mon, 01/10/2022 - 12:17pm
Mobile Applications
Switches
side-channel attacks
Side-channel attack
Servers
Scalability
Resiliency
resilience
pubcrawl
permissions
operating systems
Mobile Security
android
Metrics
malware
machine learning
Human behavior
encryption
codes
Clipboard Jacking
Audio Jacking
Audio Distortion
android encryption
biblio
Address Collision Attacks on ECSM Protected by ADPA
Submitted by grigby1 on Thu, 05/13/2021 - 12:20pm
Human behavior
Support vector machines
side-channel attacks
Side-channel attack
Scalability
Resiliency
resilience
pubcrawl
Power demand
Address collision attack
encryption
Elliptic curves
Elliptic curve cryptography
collision attack
Attack vectors
Analytical models
Address-bit DPA
biblio
Implementation White Box Cryptography in Substitution-Permutation network
Submitted by grigby1 on Thu, 03/04/2021 - 2:33pm
resilience
white-box cryptography
White Box Security
white box
substitution-permutation network
side-channel attacks
Side-channel attack
security
Resiliency
white box cryptography
pubcrawl
privacy
Metrics
leak channels
Information Leakage
Cryptography
composability
biblio
Security Network On-Chip for Mitigating Side-Channel Attacks
Submitted by aekwall on Mon, 05/11/2020 - 11:08am
multiple countermeasures
compromised device
contemporary hardware threats
design complexity
electromagnetic analysis attacks
electromagnetic interference
hardware security threats
high-confidence security network on-chip
individual threats
machine learning security IC
malicious physical interference
modern ICs
attack-specific countermeasures
on-chip distribution networks
On-chip power delivery
on-chip voltage variations
operating device-under-attack
robust confidence security network on-chip
security networks
Side-channel attack
side-channel attack mitigation
strict performance requirements
trained ML ICs
network on chip security
timing
Scalability
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
machine learning
physical interaction
system-on-chip
system security
sensors
Attack detection
security of data
Hardware Security
side-channel attacks
integrated circuit design
data analysis
malicious activity
integrated circuits
network-on-chip
active attack
advance invasive attacks
advance noninvasive attacks
advanced technology nodes
biblio
SpectreGuard: An Efficient Data-Centric Defense Mechanism against Spectre Attacks
Submitted by Heather Lucas on Mon, 03/09/2020 - 1:33pm
KU
Micro-architecture
Side-channel attack
Side-Channel Attack Resistance
Spectre
Resilient Architectures
KU
Side-Channel Attack Resistance
2019: July
biblio
Statistical Power Analysis for IoT Device Oriented Encryption with Glitch Canceller
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
Low-Power
Tamper resistance
statistical power analysis
statistical analysis
Side-channel attack
Scalability
pubcrawl
privacy
PRINCE
power consumption
Metrics
lowest latency cryptography
Big Data
IoT devise
IoT device oriented encryption
Internet of Things
Human Factors
Human behavior
Hardware Security
glitch canceller
field-programmable gate array
field programmable gate arrays
Cryptography
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
1
2
3
next ›
last »