Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Side Channel Analysis). Showing records 1 – 30 of 86 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Clemson University

1. Sun, Fei. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.

Degree: MS, Electrical and Computer Engineering (Holcomb Dept. of), 2020, Clemson University

  Applications using dedicated short-range communication (DSRC) are being developed to prevent automobile accidents. Many DSRC implementations, applications and network stacks are not mature. They… (more)

Subjects/Keywords: DSRC; HMM; side channel analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, F. (2020). Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/3429

Chicago Manual of Style (16th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Masters Thesis, Clemson University. Accessed November 24, 2020. https://tigerprints.clemson.edu/all_theses/3429.

MLA Handbook (7th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Web. 24 Nov 2020.

Vancouver:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Internet] [Masters thesis]. Clemson University; 2020. [cited 2020 Nov 24]. Available from: https://tigerprints.clemson.edu/all_theses/3429.

Council of Science Editors:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Masters Thesis]. Clemson University; 2020. Available from: https://tigerprints.clemson.edu/all_theses/3429


Virginia Tech

2. Coleman, Flora Anne. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.

Degree: MS, Computer Engineering, 2020, Virginia Tech

 In today's society, interactions with connected, data-sharing devices have become common. For example, devices like "smart" watches, remote access home security systems, and even connected… (more)

Subjects/Keywords: Lightweight Cryptography; Side Channel Analysis; FPGA; ARX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coleman, F. A. (2020). A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98758

Chicago Manual of Style (16th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Masters Thesis, Virginia Tech. Accessed November 24, 2020. http://hdl.handle.net/10919/98758.

MLA Handbook (7th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Web. 24 Nov 2020.

Vancouver:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10919/98758.

Council of Science Editors:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98758


Virginia Tech

3. Patrick, Conor Persson. Software Protection Against Fault and Side Channel Attacks.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 Embedded systems are increasingly ubiquitous. Many of them have security requirements such as smart cards, mobile phones, and internet connected appliances. It can be a… (more)

Subjects/Keywords: Fault attacks; side channel analysis; countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patrick, C. P. (2017). Software Protection Against Fault and Side Channel Attacks. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78685

Chicago Manual of Style (16th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Masters Thesis, Virginia Tech. Accessed November 24, 2020. http://hdl.handle.net/10919/78685.

MLA Handbook (7th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Web. 24 Nov 2020.

Vancouver:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10919/78685.

Council of Science Editors:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78685


University of Guelph

4. Mayhew, Matthew. Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box.

Degree: PhD, School of Engineering, 2016, University of Guelph

 This thesis presents a novel on-chip side-channel analysis countermeasure focused on preventing power analysis attacks. The proposed countermeasure makes use of a randomized switch box… (more)

Subjects/Keywords: PAA; Power Analysis Attack Countermeasure; Decoupling; Side Channel Analysis; Data Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mayhew, M. (2016). Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box. (Doctoral Dissertation). University of Guelph. Retrieved from https://atrium.lib.uoguelph.ca/xmlui/handle/10214/9589

Chicago Manual of Style (16th Edition):

Mayhew, Matthew. “Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box.” 2016. Doctoral Dissertation, University of Guelph. Accessed November 24, 2020. https://atrium.lib.uoguelph.ca/xmlui/handle/10214/9589.

MLA Handbook (7th Edition):

Mayhew, Matthew. “Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box.” 2016. Web. 24 Nov 2020.

Vancouver:

Mayhew M. Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box. [Internet] [Doctoral dissertation]. University of Guelph; 2016. [cited 2020 Nov 24]. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/9589.

Council of Science Editors:

Mayhew M. Design of an On-Chip Power Analysis Attack Countermeasure Incorporating a Randomized Switch Box. [Doctoral Dissertation]. University of Guelph; 2016. Available from: https://atrium.lib.uoguelph.ca/xmlui/handle/10214/9589

5. Ye, Xin. Side Channel Leakage Analysis - Detection, Exploitation and Quantification.

Degree: PhD, 2015, Worcester Polytechnic Institute

 Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations… (more)

Subjects/Keywords: Side Channel Analysis; Leakage Analysis; Applied Cryptography; Embedded System Security Evaluation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ye, X. (2015). Side Channel Leakage Analysis - Detection, Exploitation and Quantification. (Doctoral Dissertation). Worcester Polytechnic Institute. Retrieved from etd-012715-135840 ; https://digitalcommons.wpi.edu/etd-dissertations/47

Chicago Manual of Style (16th Edition):

Ye, Xin. “Side Channel Leakage Analysis - Detection, Exploitation and Quantification.” 2015. Doctoral Dissertation, Worcester Polytechnic Institute. Accessed November 24, 2020. etd-012715-135840 ; https://digitalcommons.wpi.edu/etd-dissertations/47.

MLA Handbook (7th Edition):

Ye, Xin. “Side Channel Leakage Analysis - Detection, Exploitation and Quantification.” 2015. Web. 24 Nov 2020.

Vancouver:

Ye X. Side Channel Leakage Analysis - Detection, Exploitation and Quantification. [Internet] [Doctoral dissertation]. Worcester Polytechnic Institute; 2015. [cited 2020 Nov 24]. Available from: etd-012715-135840 ; https://digitalcommons.wpi.edu/etd-dissertations/47.

Council of Science Editors:

Ye X. Side Channel Leakage Analysis - Detection, Exploitation and Quantification. [Doctoral Dissertation]. Worcester Polytechnic Institute; 2015. Available from: etd-012715-135840 ; https://digitalcommons.wpi.edu/etd-dissertations/47


University of New South Wales

6. Jayasinghe, Jayasinghe A. D. Nayanajith. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.

Degree: Faculty of Engineering, 2017, University of New South Wales

 Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for keeping confidential and critical data secure using a secret key to access that… (more)

Subjects/Keywords: Differential Power analysis attacks; Side channel attacks; Power analysis attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayasinghe, J. A. D. N. (2017). Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Jayasinghe, Jayasinghe A D Nayanajith. “Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.” 2017. Doctoral Dissertation, University of New South Wales. Accessed November 24, 2020. http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true.

MLA Handbook (7th Edition):

Jayasinghe, Jayasinghe A D Nayanajith. “Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.” 2017. Web. 24 Nov 2020.

Vancouver:

Jayasinghe JADN. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Nov 24]. Available from: http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true.

Council of Science Editors:

Jayasinghe JADN. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true

7. Lakshminarasimhan, Ashwin. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  With more and more ICs being used in sectors requiring confidentiality and integrity like payment systems, military, finance and health, there is a lot… (more)

Subjects/Keywords: Side-Channel Analysis; Electromagnetic side channel; Trojans; Watermarks; Electrical and Computer Engineering; VLSI and Circuits, Embedded and Hardware Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshminarasimhan, A. (2011). Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/693

Chicago Manual of Style (16th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Masters Thesis, University of Massachusetts. Accessed November 24, 2020. https://scholarworks.umass.edu/theses/693.

MLA Handbook (7th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Web. 24 Nov 2020.

Vancouver:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2020 Nov 24]. Available from: https://scholarworks.umass.edu/theses/693.

Council of Science Editors:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/693

8. Fernandez Rubio, Abraham. Efficient Side-channel Resistant MPC-based Software Implementation of the AES.

Degree: MS, 2017, Worcester Polytechnic Institute

 Current cryptographic algorithms pose high standards of security yet they are susceptible to side-channel analysis (SCA). When it comes to implementation, the hardness of cryptography… (more)

Subjects/Keywords: side-channel analysis; multiparty computation; AES; polynomial masking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fernandez Rubio, A. (2017). Efficient Side-channel Resistant MPC-based Software Implementation of the AES. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-042717-122213 ; https://digitalcommons.wpi.edu/etd-theses/403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fernandez Rubio, Abraham. “Efficient Side-channel Resistant MPC-based Software Implementation of the AES.” 2017. Thesis, Worcester Polytechnic Institute. Accessed November 24, 2020. etd-042717-122213 ; https://digitalcommons.wpi.edu/etd-theses/403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fernandez Rubio, Abraham. “Efficient Side-channel Resistant MPC-based Software Implementation of the AES.” 2017. Web. 24 Nov 2020.

Vancouver:

Fernandez Rubio A. Efficient Side-channel Resistant MPC-based Software Implementation of the AES. [Internet] [Thesis]. Worcester Polytechnic Institute; 2017. [cited 2020 Nov 24]. Available from: etd-042717-122213 ; https://digitalcommons.wpi.edu/etd-theses/403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fernandez Rubio A. Efficient Side-channel Resistant MPC-based Software Implementation of the AES. [Thesis]. Worcester Polytechnic Institute; 2017. Available from: etd-042717-122213 ; https://digitalcommons.wpi.edu/etd-theses/403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

9. Faraj, Mustafa. Side Channel Attack on Low Power FPGA Platform.

Degree: 2016, University of Waterloo

 In today's advanced electronic age, people have become accustomed to using electronic devices to store and process their information. There is a general belief that… (more)

Subjects/Keywords: Hardware Security; Side Channel Attack; Correlation Analysis; FPGA

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faraj, M. (2016). Side Channel Attack on Low Power FPGA Platform. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/10769

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faraj, Mustafa. “Side Channel Attack on Low Power FPGA Platform.” 2016. Thesis, University of Waterloo. Accessed November 24, 2020. http://hdl.handle.net/10012/10769.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faraj, Mustafa. “Side Channel Attack on Low Power FPGA Platform.” 2016. Web. 24 Nov 2020.

Vancouver:

Faraj M. Side Channel Attack on Low Power FPGA Platform. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10012/10769.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faraj M. Side Channel Attack on Low Power FPGA Platform. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/10769

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

10. Taha, Mostafa Mohamed Ibrahim. Advances in the Side-Channel Analysis of Symmetric Cryptography.

Degree: PhD, Computer Engineering, 2014, Virginia Tech

Side-Channel Analysis (SCA) is an implementation attack where an adversary exploits unintentional outputs of a cryptographic module to reveal secret information. Unintentional outputs, also called… (more)

Subjects/Keywords: Side-Channel Analysis; Practical Leakage Resiliency; AES; SHA-3

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Taha, M. M. I. (2014). Advances in the Side-Channel Analysis of Symmetric Cryptography. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/79559

Chicago Manual of Style (16th Edition):

Taha, Mostafa Mohamed Ibrahim. “Advances in the Side-Channel Analysis of Symmetric Cryptography.” 2014. Doctoral Dissertation, Virginia Tech. Accessed November 24, 2020. http://hdl.handle.net/10919/79559.

MLA Handbook (7th Edition):

Taha, Mostafa Mohamed Ibrahim. “Advances in the Side-Channel Analysis of Symmetric Cryptography.” 2014. Web. 24 Nov 2020.

Vancouver:

Taha MMI. Advances in the Side-Channel Analysis of Symmetric Cryptography. [Internet] [Doctoral dissertation]. Virginia Tech; 2014. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10919/79559.

Council of Science Editors:

Taha MMI. Advances in the Side-Channel Analysis of Symmetric Cryptography. [Doctoral Dissertation]. Virginia Tech; 2014. Available from: http://hdl.handle.net/10919/79559


The Ohio State University

11. Shvartsman, Phillip. Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation.

Degree: MS, Electrical and Computer Engineering, 2019, The Ohio State University

 The Advanced Encryption Standard (AES) is the current standard for symmetric key ciphers and is algorithmically secure. Side channel attacks that target power consumption can… (more)

Subjects/Keywords: Engineering; AES; cryptography; side channel attack; power analysis; finite field

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shvartsman, P. (2019). Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation. (Masters Thesis). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036

Chicago Manual of Style (16th Edition):

Shvartsman, Phillip. “Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation.” 2019. Masters Thesis, The Ohio State University. Accessed November 24, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.

MLA Handbook (7th Edition):

Shvartsman, Phillip. “Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation.” 2019. Web. 24 Nov 2020.

Vancouver:

Shvartsman P. Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation. [Internet] [Masters thesis]. The Ohio State University; 2019. [cited 2020 Nov 24]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036.

Council of Science Editors:

Shvartsman P. Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation. [Masters Thesis]. The Ohio State University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1555438117106036

12. Carmona, Manuel Bejarano. A simple and low cost platform to perform Power Analysis Attacks.

Degree: 2012, , School of Engineering

  Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so,… (more)

Subjects/Keywords: power analysis side channel attacks spa dpa simple differential; Computer Sciences; Datavetenskap (datalogi); Telecommunications; Telekommunikation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carmona, M. B. (2012). A simple and low cost platform to perform Power Analysis Attacks. (Thesis). , School of Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carmona, Manuel Bejarano. “A simple and low cost platform to perform Power Analysis Attacks.” 2012. Thesis, , School of Engineering. Accessed November 24, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carmona, Manuel Bejarano. “A simple and low cost platform to perform Power Analysis Attacks.” 2012. Web. 24 Nov 2020.

Vancouver:

Carmona MB. A simple and low cost platform to perform Power Analysis Attacks. [Internet] [Thesis]. , School of Engineering; 2012. [cited 2020 Nov 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carmona MB. A simple and low cost platform to perform Power Analysis Attacks. [Thesis]. , School of Engineering; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Virginia Tech

13. Wu, Meng. Analysis and Enforcement of Properties in Software Systems.

Degree: PhD, Computer Engineering, 2019, Virginia Tech

 It is important for everything around us to follow some rules to work correctly. That is the same for our software systems to follow the… (more)

Subjects/Keywords: Shield Synthesis; Program Analysis; Timing Side Channel; Cache Timing Leak; Speculative Execution; Abstract Interpretation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, M. (2019). Analysis and Enforcement of Properties in Software Systems. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/90887

Chicago Manual of Style (16th Edition):

Wu, Meng. “Analysis and Enforcement of Properties in Software Systems.” 2019. Doctoral Dissertation, Virginia Tech. Accessed November 24, 2020. http://hdl.handle.net/10919/90887.

MLA Handbook (7th Edition):

Wu, Meng. “Analysis and Enforcement of Properties in Software Systems.” 2019. Web. 24 Nov 2020.

Vancouver:

Wu M. Analysis and Enforcement of Properties in Software Systems. [Internet] [Doctoral dissertation]. Virginia Tech; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10919/90887.

Council of Science Editors:

Wu M. Analysis and Enforcement of Properties in Software Systems. [Doctoral Dissertation]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/90887


Virginia Tech

14. Yu, Xiaodong. Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms.

Degree: PhD, Computer Science and Applications, 2019, Virginia Tech

 Typical cybersecurity solutions emphasize on achieving defense functionalities. However, execution efficiency and scalability are equally important, especially for the real-world deployment. Straightforward mappings of applications… (more)

Subjects/Keywords: Cybersecurity; HPC; GPU; Intrusion Detection; Automata Processor; Android Program Analysis; Cache Side-Channel Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, X. (2019). Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/93510

Chicago Manual of Style (16th Edition):

Yu, Xiaodong. “Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms.” 2019. Doctoral Dissertation, Virginia Tech. Accessed November 24, 2020. http://hdl.handle.net/10919/93510.

MLA Handbook (7th Edition):

Yu, Xiaodong. “Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms.” 2019. Web. 24 Nov 2020.

Vancouver:

Yu X. Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms. [Internet] [Doctoral dissertation]. Virginia Tech; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10919/93510.

Council of Science Editors:

Yu X. Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms. [Doctoral Dissertation]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/93510


KTH

15. Zhao, Zihao. Far Field Electromagnetic Side Channel Analysis of AES.

Degree: Electrical Engineering and Computer Science (EECS), 2020, KTH

Side-Channel Attacks (SCAs) have become a realistic threat to implementations of cryptographic algorithms. By utilizing the unintentionally leaked side-channel information during the execution of… (more)

Subjects/Keywords: Side-channel analysis; far-feild electromagnetic emission; AES; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, Z. (2020). Far Field Electromagnetic Side Channel Analysis of AES. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhao, Zihao. “Far Field Electromagnetic Side Channel Analysis of AES.” 2020. Thesis, KTH. Accessed November 24, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhao, Zihao. “Far Field Electromagnetic Side Channel Analysis of AES.” 2020. Web. 24 Nov 2020.

Vancouver:

Zhao Z. Far Field Electromagnetic Side Channel Analysis of AES. [Internet] [Thesis]. KTH; 2020. [cited 2020 Nov 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281343.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhao Z. Far Field Electromagnetic Side Channel Analysis of AES. [Thesis]. KTH; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281343

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Waterloo

16. Moreno, Carlos. Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging.

Degree: 2013, University of Waterloo

Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded… (more)

Subjects/Keywords: cryptography; embedded systems; embedded systems security; side-channel analysis; timing attacks; power analysis; spa-resistant implementations; embedded systems debugging

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moreno, C. (2013). Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/7506

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moreno, Carlos. “Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging.” 2013. Thesis, University of Waterloo. Accessed November 24, 2020. http://hdl.handle.net/10012/7506.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moreno, Carlos. “Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging.” 2013. Web. 24 Nov 2020.

Vancouver:

Moreno C. Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging. [Internet] [Thesis]. University of Waterloo; 2013. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10012/7506.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moreno C. Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging. [Thesis]. University of Waterloo; 2013. Available from: http://hdl.handle.net/10012/7506

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

17. Constable, Scott Douglas. STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM.

Degree: PhD, Electrical Engineering and Computer Science, 2018, Syracuse University

  A side channel is an observable attribute of program execution other than explicit communication, e.g., power usage, execution time, or page fault patterns. A… (more)

Subjects/Keywords: cloud security; dynamic analysis; information-flow analysis; language-based techniques; side-channel attacks; template metaprogramming; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Constable, S. D. (2018). STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/950

Chicago Manual of Style (16th Edition):

Constable, Scott Douglas. “STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM.” 2018. Doctoral Dissertation, Syracuse University. Accessed November 24, 2020. https://surface.syr.edu/etd/950.

MLA Handbook (7th Edition):

Constable, Scott Douglas. “STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM.” 2018. Web. 24 Nov 2020.

Vancouver:

Constable SD. STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM. [Internet] [Doctoral dissertation]. Syracuse University; 2018. [cited 2020 Nov 24]. Available from: https://surface.syr.edu/etd/950.

Council of Science Editors:

Constable SD. STATIC ENFORCEMENT OF TERMINATION-SENSITIVE NONINTERFERENCE USING THE C++ TEMPLATE TYPE SYSTEM. [Doctoral Dissertation]. Syracuse University; 2018. Available from: https://surface.syr.edu/etd/950


Brno University of Technology

18. Novotný, Bohumil. Diferenciální elektromagnetická analýza: Differential electromagnetic analysis.

Degree: 2019, Brno University of Technology

 This diploma thesis studies the theory side channels, simple and differential analysis, and types of attacks on the side channel, which may be run against… (more)

Subjects/Keywords: postranní kanál; jednoduchá analýza; diferenciální analýza; měřicí metody; sonda; side channel; simple analysis; differential analysis; measurement methods; probe

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novotný, B. (2019). Diferenciální elektromagnetická analýza: Differential electromagnetic analysis. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/26813

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Novotný, Bohumil. “Diferenciální elektromagnetická analýza: Differential electromagnetic analysis.” 2019. Thesis, Brno University of Technology. Accessed November 24, 2020. http://hdl.handle.net/11012/26813.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Novotný, Bohumil. “Diferenciální elektromagnetická analýza: Differential electromagnetic analysis.” 2019. Web. 24 Nov 2020.

Vancouver:

Novotný B. Diferenciální elektromagnetická analýza: Differential electromagnetic analysis. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/11012/26813.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Novotný B. Diferenciální elektromagnetická analýza: Differential electromagnetic analysis. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/26813

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

19. Hirš, David. Skrývání proudové spotřeby: Hiding of current consumption.

Degree: 2019, Brno University of Technology

 Power analysis presents the typical example of successful attacks against trusted cryptographic devices such as smart cards or embedded devices. Nowadays, the popularity of Internet… (more)

Subjects/Keywords: PRESENT; odlehčená šifra; proudová analýza; SPA; DPA; protiopatření; hardwarová rekonfigurace; postranní kanály; PRESENT; lightweight cipher; side channel; power analysis; SPA; DPA; countermeasures; hardware reconfiguration; side channels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hirš, D. (2019). Skrývání proudové spotřeby: Hiding of current consumption. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173559

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hirš, David. “Skrývání proudové spotřeby: Hiding of current consumption.” 2019. Thesis, Brno University of Technology. Accessed November 24, 2020. http://hdl.handle.net/11012/173559.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hirš, David. “Skrývání proudové spotřeby: Hiding of current consumption.” 2019. Web. 24 Nov 2020.

Vancouver:

Hirš D. Skrývání proudové spotřeby: Hiding of current consumption. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/11012/173559.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hirš D. Skrývání proudové spotřeby: Hiding of current consumption. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173559

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Diop, Ibrahima. Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation.

Degree: Docteur es, Microélectronique, 2017, Lyon

Dans cette thèse, nous étudions deux sous-familles d'attaques par canaux cachés sur l'exponentiation modulaire appelées respectivement attaques par collision et attaques horizontales. Cette étude est… (more)

Subjects/Keywords: Analyse par canaux cachés; Attaques par collision; Attaques horizontales; Side channel analysis; Collision based attacks; Horizontal attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diop, I. (2017). Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation. (Doctoral Dissertation). Lyon. Retrieved from http://www.theses.fr/2017LYSEM010

Chicago Manual of Style (16th Edition):

Diop, Ibrahima. “Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation.” 2017. Doctoral Dissertation, Lyon. Accessed November 24, 2020. http://www.theses.fr/2017LYSEM010.

MLA Handbook (7th Edition):

Diop, Ibrahima. “Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation.” 2017. Web. 24 Nov 2020.

Vancouver:

Diop I. Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation. [Internet] [Doctoral dissertation]. Lyon; 2017. [cited 2020 Nov 24]. Available from: http://www.theses.fr/2017LYSEM010.

Council of Science Editors:

Diop I. Méthodologie et outils pour la mise en pratique des attaques par collision et attaques horizontales sur l'exponentiation modulaire : From theory to practice of collision based attacks and horizontal attacks applied on protected implementation of modular exponentiation. [Doctoral Dissertation]. Lyon; 2017. Available from: http://www.theses.fr/2017LYSEM010


University of California – Irvine

21. Rokka Chhetri, Sujit. Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems.

Degree: Electrical and Computer Engineering, 2016, University of California – Irvine

 Cyber-physical systems consists of tight integration of cyber and physical domain components. Due to this, they are prone to various cross-domain attacks. One form of… (more)

Subjects/Keywords: Computer engineering; Computer science; Electrical engineering; Additive Manufacturing; Confidentiality; Cyber-Physical Systems; Machine Learning; Security; Side-Channel Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rokka Chhetri, S. (2016). Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/6c52g94w

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rokka Chhetri, Sujit. “Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems.” 2016. Thesis, University of California – Irvine. Accessed November 24, 2020. http://www.escholarship.org/uc/item/6c52g94w.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rokka Chhetri, Sujit. “Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems.” 2016. Web. 24 Nov 2020.

Vancouver:

Rokka Chhetri S. Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems. [Internet] [Thesis]. University of California – Irvine; 2016. [cited 2020 Nov 24]. Available from: http://www.escholarship.org/uc/item/6c52g94w.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rokka Chhetri S. Novel Side-Channel Attack Model for Cyber-Physical Additive Manufacturing Systems. [Thesis]. University of California – Irvine; 2016. Available from: http://www.escholarship.org/uc/item/6c52g94w

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

22. Smith, Kenneth James. Methodologies for power analysis attacks on hardware implementations of AES.

Degree: Computer Engineering, 2009, Rochester Institute of Technology

Side Channel Attacks (SCA) exploit weaknesses in implementations of cryptographic functions resulting from unintended inputs and outputs such as execution timing, power consumption, electromagnetic radiation,… (more)

Subjects/Keywords: AES hardware; Power analysis attacks; Side channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, K. J. (2009). Methodologies for power analysis attacks on hardware implementations of AES. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/3197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Smith, Kenneth James. “Methodologies for power analysis attacks on hardware implementations of AES.” 2009. Thesis, Rochester Institute of Technology. Accessed November 24, 2020. https://scholarworks.rit.edu/theses/3197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Smith, Kenneth James. “Methodologies for power analysis attacks on hardware implementations of AES.” 2009. Web. 24 Nov 2020.

Vancouver:

Smith KJ. Methodologies for power analysis attacks on hardware implementations of AES. [Internet] [Thesis]. Rochester Institute of Technology; 2009. [cited 2020 Nov 24]. Available from: https://scholarworks.rit.edu/theses/3197.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Smith KJ. Methodologies for power analysis attacks on hardware implementations of AES. [Thesis]. Rochester Institute of Technology; 2009. Available from: https://scholarworks.rit.edu/theses/3197

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Michigan

23. Lu, Shengshuo. Secure and Energy-Efficient Processors.

Degree: PhD, Electrical Engineering, 2017, University of Michigan

 Security has become an essential part of digital information storage and processing. Both high-end and low-end applications, such as data centers and Internet of Things… (more)

Subjects/Keywords: Energy efficient ASICs; Advanced Encryption Standard (AES); Side channel attacks; Differential Power Analysis (DPA); Charge recovery logic; Electrical Engineering; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, S. (2017). Secure and Energy-Efficient Processors. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/138791

Chicago Manual of Style (16th Edition):

Lu, Shengshuo. “Secure and Energy-Efficient Processors.” 2017. Doctoral Dissertation, University of Michigan. Accessed November 24, 2020. http://hdl.handle.net/2027.42/138791.

MLA Handbook (7th Edition):

Lu, Shengshuo. “Secure and Energy-Efficient Processors.” 2017. Web. 24 Nov 2020.

Vancouver:

Lu S. Secure and Energy-Efficient Processors. [Internet] [Doctoral dissertation]. University of Michigan; 2017. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/2027.42/138791.

Council of Science Editors:

Lu S. Secure and Energy-Efficient Processors. [Doctoral Dissertation]. University of Michigan; 2017. Available from: http://hdl.handle.net/2027.42/138791


University of Waterloo

24. Flores, Adan. Non-Intrusive system behavior tracing using power consumption.

Degree: 2020, University of Waterloo

 This thesis presents a novel non-intrusive method of creating a map of black-box systems’ behavior to commands by observing the power consumption of the system.… (more)

Subjects/Keywords: side channel behaviour analysis; power tracing; Computers; Power supply; Efficiency; Energy consumption; Power resources; Data processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Flores, A. (2020). Non-Intrusive system behavior tracing using power consumption. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/15841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Flores, Adan. “Non-Intrusive system behavior tracing using power consumption.” 2020. Thesis, University of Waterloo. Accessed November 24, 2020. http://hdl.handle.net/10012/15841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Flores, Adan. “Non-Intrusive system behavior tracing using power consumption.” 2020. Web. 24 Nov 2020.

Vancouver:

Flores A. Non-Intrusive system behavior tracing using power consumption. [Internet] [Thesis]. University of Waterloo; 2020. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/10012/15841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Flores A. Non-Intrusive system behavior tracing using power consumption. [Thesis]. University of Waterloo; 2020. Available from: http://hdl.handle.net/10012/15841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Bordeaux I

25. Verneuil, Pierre. Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices.

Degree: Docteur es, Mathématiques pures, 2012, Université de Bordeaux I

Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employés dans les protocoles utilisant la cryptographie à clef publique. Ceci… (more)

Subjects/Keywords: Cryptographie; Analyse par canaux auxilliaires; Courbes elliptiques; Rsa; Multiplication scalaire; Exponentiation; Cryptography; Side-channel analysis; Elliptic curves; Rsa; Scalar multiplication; Exponentiation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Verneuil, P. (2012). Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices. (Doctoral Dissertation). Université de Bordeaux I. Retrieved from http://www.theses.fr/2012BOR14529

Chicago Manual of Style (16th Edition):

Verneuil, Pierre. “Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices.” 2012. Doctoral Dissertation, Université de Bordeaux I. Accessed November 24, 2020. http://www.theses.fr/2012BOR14529.

MLA Handbook (7th Edition):

Verneuil, Pierre. “Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices.” 2012. Web. 24 Nov 2020.

Vancouver:

Verneuil P. Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices. [Internet] [Doctoral dissertation]. Université de Bordeaux I; 2012. [cited 2020 Nov 24]. Available from: http://www.theses.fr/2012BOR14529.

Council of Science Editors:

Verneuil P. Cryptographie à base de courbes elliptiques et sécurité de composants embarqués : Elliptic curve cryptography and security of embedded devices. [Doctoral Dissertation]. Université de Bordeaux I; 2012. Available from: http://www.theses.fr/2012BOR14529


Université Catholique de Louvain

26. Neve de Mevergnies, Michael. Cache-based vulnerabilities and spam analysis.

Degree: 2006, Université Catholique de Louvain

Two problems of computer security are investigated. On one hand, we are facing a practical problematic of actual processors: the cache, an element of the… (more)

Subjects/Keywords: Cache; Side channel; Hardware; Microprocessor; Spam analysis and prevention

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Neve de Mevergnies, M. (2006). Cache-based vulnerabilities and spam analysis. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Neve de Mevergnies, Michael. “Cache-based vulnerabilities and spam analysis.” 2006. Thesis, Université Catholique de Louvain. Accessed November 24, 2020. http://hdl.handle.net/2078.1/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Neve de Mevergnies, Michael. “Cache-based vulnerabilities and spam analysis.” 2006. Web. 24 Nov 2020.

Vancouver:

Neve de Mevergnies M. Cache-based vulnerabilities and spam analysis. [Internet] [Thesis]. Université Catholique de Louvain; 2006. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/2078.1/5035.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Neve de Mevergnies M. Cache-based vulnerabilities and spam analysis. [Thesis]. Université Catholique de Louvain; 2006. Available from: http://hdl.handle.net/2078.1/5035

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

27. Carter, Matthew. Enabling a Control System Approach to Side-Channel and Fault Attacks .

Degree: George Mason University

 As the number of embedded devices continues to grow, attacks that require physical access to the device become more plausible. Two sub-classifications of these attacks,… (more)

Subjects/Keywords: Side-Channel Analysis; Fault Attacks; Control System; FOBOS

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carter, M. (n.d.). Enabling a Control System Approach to Side-Channel and Fault Attacks . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/11445

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carter, Matthew. “Enabling a Control System Approach to Side-Channel and Fault Attacks .” Thesis, George Mason University. Accessed November 24, 2020. http://hdl.handle.net/1920/11445.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carter, Matthew. “Enabling a Control System Approach to Side-Channel and Fault Attacks .” Web. 24 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Carter M. Enabling a Control System Approach to Side-Channel and Fault Attacks . [Internet] [Thesis]. George Mason University; [cited 2020 Nov 24]. Available from: http://hdl.handle.net/1920/11445.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Carter M. Enabling a Control System Approach to Side-Channel and Fault Attacks . [Thesis]. George Mason University; Available from: http://hdl.handle.net/1920/11445

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


Brno University of Technology

28. Budík, Lukáš. Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks.

Degree: 2019, Brno University of Technology

 This dissertation deals with analysis of current side canal by means of neural network. First part describes basis of cryptografy and dilemma of side canal.… (more)

Subjects/Keywords: Kryptografie; postranní kanál; neuronová síť; korelační analýza; klasifikátor; Cryptography; side channel; neural network; correlation analysis; classifier

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Budík, L. (2019). Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/3794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Budík, Lukáš. “Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks.” 2019. Thesis, Brno University of Technology. Accessed November 24, 2020. http://hdl.handle.net/11012/3794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Budík, Lukáš. “Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks.” 2019. Web. 24 Nov 2020.

Vancouver:

Budík L. Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/11012/3794.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Budík L. Kryptoanalýza pomocí neuronových sítí: Cryptanalysis using neural networks. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/3794

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

29. Zapletal, Ondřej. Proudový postranní kanál: Power side channel.

Degree: 2019, Brno University of Technology

 This thesis deals with side-channel cryptoanalysis. It is focused on power side-channel attack on cryptographic device. The microcontroller PIC is used as the cryptographic device.… (more)

Subjects/Keywords: Kryptoanalýza; proudový postranní kanál; proudová analýza; AES; mikrokontrolér PIC; Cryptanalysis; power side-channel; power analysis; AES; PIC microcontroller

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zapletal, O. (2019). Proudový postranní kanál: Power side channel. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/9616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zapletal, Ondřej. “Proudový postranní kanál: Power side channel.” 2019. Thesis, Brno University of Technology. Accessed November 24, 2020. http://hdl.handle.net/11012/9616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zapletal, Ondřej. “Proudový postranní kanál: Power side channel.” 2019. Web. 24 Nov 2020.

Vancouver:

Zapletal O. Proudový postranní kanál: Power side channel. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/11012/9616.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zapletal O. Proudový postranní kanál: Power side channel. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/9616

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

30. Novosadová, Tatiana. Kryptoanalýza postranními kanály: Side-channel analysis.

Degree: 2019, Brno University of Technology

 This thesis deals with an issue of side channels, elliptic curves and their implementation in algorithms. Theoretical part is aimed at describing the basic concepts… (more)

Subjects/Keywords: Kryptoanalýza; postranný kanál; diferenciálna prúdová analýza; eliptické krivky; čipová karta; Cryptanalysis; side channel; differential power analysis; elliptic curves; smart card

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novosadová, T. (2019). Kryptoanalýza postranními kanály: Side-channel analysis. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/173576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Novosadová, Tatiana. “Kryptoanalýza postranními kanály: Side-channel analysis.” 2019. Thesis, Brno University of Technology. Accessed November 24, 2020. http://hdl.handle.net/11012/173576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Novosadová, Tatiana. “Kryptoanalýza postranními kanály: Side-channel analysis.” 2019. Web. 24 Nov 2020.

Vancouver:

Novosadová T. Kryptoanalýza postranními kanály: Side-channel analysis. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2020 Nov 24]. Available from: http://hdl.handle.net/11012/173576.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Novosadová T. Kryptoanalýza postranními kanály: Side-channel analysis. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/173576

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3]

.