NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme | 0 | 0.34 | 2022 |
Macm: How To Reduce The Multi-Round Sca To The Single-Round Attack On The Feistel-Sp Networks | 0 | 0.34 | 2020 |
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC | 0 | 0.34 | 2019 |
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A | 0 | 0.34 | 2019 |
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. | 0 | 0.34 | 2017 |
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. | 0 | 0.34 | 2016 |
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. | 0 | 0.34 | 2016 |
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. | 0 | 0.34 | 2015 |
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. | 0 | 0.34 | 2015 |