Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Side channel). Showing records 1 – 30 of 270 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Université Catholique de Louvain

1. Grosso, Vincent. Towards side-channel secure block ciphers.

Degree: 2015, Université Catholique de Louvain

Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They use observations of physical features of a device while it computes… (more)

Subjects/Keywords: Side-channel; Masking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grosso, V. (2015). Towards side-channel secure block ciphers. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/169211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grosso, Vincent. “Towards side-channel secure block ciphers.” 2015. Thesis, Université Catholique de Louvain. Accessed October 24, 2020. http://hdl.handle.net/2078.1/169211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grosso, Vincent. “Towards side-channel secure block ciphers.” 2015. Web. 24 Oct 2020.

Vancouver:

Grosso V. Towards side-channel secure block ciphers. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/2078.1/169211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grosso V. Towards side-channel secure block ciphers. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/169211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

2. -7290-5050. Broad-based side-channel defenses for modern microprocessors.

Degree: PhD, Computer Science, 2019, University of Texas – Austin

 Private or confidential information is used in a wide variety of applications, not just including implementations of cryptographic algorithms but also including machine-learning libraries, databases,… (more)

Subjects/Keywords: Side-channel defenses

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-7290-5050. (2019). Broad-based side-channel defenses for modern microprocessors. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2661

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-7290-5050. “Broad-based side-channel defenses for modern microprocessors.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed October 24, 2020. http://dx.doi.org/10.26153/tsw/2661.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-7290-5050. “Broad-based side-channel defenses for modern microprocessors.” 2019. Web. 24 Oct 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-7290-5050. Broad-based side-channel defenses for modern microprocessors. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2020 Oct 24]. Available from: http://dx.doi.org/10.26153/tsw/2661.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-7290-5050. Broad-based side-channel defenses for modern microprocessors. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/2661

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Clemson University

3. Sun, Fei. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.

Degree: MS, Electrical and Computer Engineering (Holcomb Dept. of), 2020, Clemson University

  Applications using dedicated short-range communication (DSRC) are being developed to prevent automobile accidents. Many DSRC implementations, applications and network stacks are not mature. They… (more)

Subjects/Keywords: DSRC; HMM; side channel analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, F. (2020). Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/3429

Chicago Manual of Style (16th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Masters Thesis, Clemson University. Accessed October 24, 2020. https://tigerprints.clemson.edu/all_theses/3429.

MLA Handbook (7th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Web. 24 Oct 2020.

Vancouver:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Internet] [Masters thesis]. Clemson University; 2020. [cited 2020 Oct 24]. Available from: https://tigerprints.clemson.edu/all_theses/3429.

Council of Science Editors:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Masters Thesis]. Clemson University; 2020. Available from: https://tigerprints.clemson.edu/all_theses/3429


Oregon State University

4. Yoo, Jaewon. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.

Degree: MS, Electrical and Computer Engineering, 2008, Oregon State University

 The Advent of multi-cores allows programs to be executed much faster than before. Cryptoalgorithms use long-bit words thus parallelizing these operations on multi-cores will achieve… (more)

Subjects/Keywords: Side Channel Attack; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yoo, J. (2008). Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/8927

Chicago Manual of Style (16th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Masters Thesis, Oregon State University. Accessed October 24, 2020. http://hdl.handle.net/1957/8927.

MLA Handbook (7th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Web. 24 Oct 2020.

Vancouver:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Internet] [Masters thesis]. Oregon State University; 2008. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/1957/8927.

Council of Science Editors:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Masters Thesis]. Oregon State University; 2008. Available from: http://hdl.handle.net/1957/8927


Université Catholique de Louvain

5. Renauld, Mathieu. Advanced extraction and exploitation of side-channel information in cryptographic implementations.

Degree: 2012, Université Catholique de Louvain

With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartcards, car keys,...). Many of these applications require security or privacy features for which… (more)

Subjects/Keywords: Cryptography; Side-Channel Cryptanalysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Renauld, M. (2012). Advanced extraction and exploitation of side-channel information in cryptographic implementations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/115152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Renauld, Mathieu. “Advanced extraction and exploitation of side-channel information in cryptographic implementations.” 2012. Thesis, Université Catholique de Louvain. Accessed October 24, 2020. http://hdl.handle.net/2078.1/115152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Renauld, Mathieu. “Advanced extraction and exploitation of side-channel information in cryptographic implementations.” 2012. Web. 24 Oct 2020.

Vancouver:

Renauld M. Advanced extraction and exploitation of side-channel information in cryptographic implementations. [Internet] [Thesis]. Université Catholique de Louvain; 2012. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/2078.1/115152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Renauld M. Advanced extraction and exploitation of side-channel information in cryptographic implementations. [Thesis]. Université Catholique de Louvain; 2012. Available from: http://hdl.handle.net/2078.1/115152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

6. van Tienen, Freek (author). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.

Degree: 2018, Delft University of Technology

 In almost every device cryptographic functions are used to protect data and sensitive information from being intercepted. A commonly used encryption algorithm is the Advanced… (more)

Subjects/Keywords: Side-Channel Attacks; AES; Electromagnetic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van Tienen, F. (. (2018). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b

Chicago Manual of Style (16th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Masters Thesis, Delft University of Technology. Accessed October 24, 2020. http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

MLA Handbook (7th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Web. 24 Oct 2020.

Vancouver:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Oct 24]. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

Council of Science Editors:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b


University of Minnesota

7. Paulsen, Brandon. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.

Degree: MS, Computer Science, 2017, University of Minnesota

 Compression side-channel attacks like CRIME and BREACH have made compression a liability even though it is a powerful tool for improving efficiency. We present debreach,… (more)

Subjects/Keywords: BREACH; compression; security; side channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paulsen, B. (2017). debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/190584

Chicago Manual of Style (16th Edition):

Paulsen, Brandon. “debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.” 2017. Masters Thesis, University of Minnesota. Accessed October 24, 2020. http://hdl.handle.net/11299/190584.

MLA Handbook (7th Edition):

Paulsen, Brandon. “debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.” 2017. Web. 24 Oct 2020.

Vancouver:

Paulsen B. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. [Internet] [Masters thesis]. University of Minnesota; 2017. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/11299/190584.

Council of Science Editors:

Paulsen B. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. [Masters Thesis]. University of Minnesota; 2017. Available from: http://hdl.handle.net/11299/190584

8. Moukarzel, Michael Antoine. Understanding and Countermeasures against IoT Physical Side Channel Leakage.

Degree: PhD, 2019, Worcester Polytechnic Institute

 With the proliferation of cheap bulk SSD storage and better batteries in the last few years we are experiencing an explosion in the number of… (more)

Subjects/Keywords: countermeasure; embedded; IoT; Side-channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moukarzel, M. A. (2019). Understanding and Countermeasures against IoT Physical Side Channel Leakage. (Doctoral Dissertation). Worcester Polytechnic Institute. Retrieved from etd-042419-153713 ; https://digitalcommons.wpi.edu/etd-dissertations/522

Chicago Manual of Style (16th Edition):

Moukarzel, Michael Antoine. “Understanding and Countermeasures against IoT Physical Side Channel Leakage.” 2019. Doctoral Dissertation, Worcester Polytechnic Institute. Accessed October 24, 2020. etd-042419-153713 ; https://digitalcommons.wpi.edu/etd-dissertations/522.

MLA Handbook (7th Edition):

Moukarzel, Michael Antoine. “Understanding and Countermeasures against IoT Physical Side Channel Leakage.” 2019. Web. 24 Oct 2020.

Vancouver:

Moukarzel MA. Understanding and Countermeasures against IoT Physical Side Channel Leakage. [Internet] [Doctoral dissertation]. Worcester Polytechnic Institute; 2019. [cited 2020 Oct 24]. Available from: etd-042419-153713 ; https://digitalcommons.wpi.edu/etd-dissertations/522.

Council of Science Editors:

Moukarzel MA. Understanding and Countermeasures against IoT Physical Side Channel Leakage. [Doctoral Dissertation]. Worcester Polytechnic Institute; 2019. Available from: etd-042419-153713 ; https://digitalcommons.wpi.edu/etd-dissertations/522


Georgia Tech

9. Shih, Mingwei. Securing Intel SGX against side-channel attacks via load-time synthesis.

Degree: PhD, Computer Science, 2019, Georgia Tech

 In response to the growing need for securing user data in the cloud, recent Intel processors have supported a new feature, Intel Software Guard Extensions… (more)

Subjects/Keywords: Intel SGX; Side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shih, M. (2019). Securing Intel SGX against side-channel attacks via load-time synthesis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62337

Chicago Manual of Style (16th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Doctoral Dissertation, Georgia Tech. Accessed October 24, 2020. http://hdl.handle.net/1853/62337.

MLA Handbook (7th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Web. 24 Oct 2020.

Vancouver:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/1853/62337.

Council of Science Editors:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62337


University of Newcastle

10. Asadi, Behzad. Broadcast channels with receiver message side information.

Degree: PhD, 2017, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

In this thesis, we investigate the capacity region of broadcast channels where each receiver may partially or fully… (more)

Subjects/Keywords: broadcast channel; side information; capacity region

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asadi, B. (2017). Broadcast channels with receiver message side information. (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1333509

Chicago Manual of Style (16th Edition):

Asadi, Behzad. “Broadcast channels with receiver message side information.” 2017. Doctoral Dissertation, University of Newcastle. Accessed October 24, 2020. http://hdl.handle.net/1959.13/1333509.

MLA Handbook (7th Edition):

Asadi, Behzad. “Broadcast channels with receiver message side information.” 2017. Web. 24 Oct 2020.

Vancouver:

Asadi B. Broadcast channels with receiver message side information. [Internet] [Doctoral dissertation]. University of Newcastle; 2017. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/1959.13/1333509.

Council of Science Editors:

Asadi B. Broadcast channels with receiver message side information. [Doctoral Dissertation]. University of Newcastle; 2017. Available from: http://hdl.handle.net/1959.13/1333509


University of Houston

11. Lu, Xi 1993-. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.

Degree: MS, Computer Science, 2017, University of Houston

 In order to make apps functional, mobile operating systems, such as Android, allow applications to access some system data without asking for user permission. We… (more)

Subjects/Keywords: Vulnerability; Side channel; Mobile phone; Smartphone; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, X. 1. (2017). Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. (Masters Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/4551

Chicago Manual of Style (16th Edition):

Lu, Xi 1993-. “Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.” 2017. Masters Thesis, University of Houston. Accessed October 24, 2020. http://hdl.handle.net/10657/4551.

MLA Handbook (7th Edition):

Lu, Xi 1993-. “Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.” 2017. Web. 24 Oct 2020.

Vancouver:

Lu X1. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. [Internet] [Masters thesis]. University of Houston; 2017. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/10657/4551.

Council of Science Editors:

Lu X1. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. [Masters Thesis]. University of Houston; 2017. Available from: http://hdl.handle.net/10657/4551


University of Cambridge

12. O'Connell, Christian David. Exploiting quasiperiodic electromagnetic radiation using software-defined radio.

Degree: PhD, 2019, University of Cambridge

 Electronic devices emanate unintentional electromagnetic radiation from which an attacker can extract sensitive information. In video display units these are quasiperiodic: nearly periodic in the… (more)

Subjects/Keywords: Digital Signal Processing; TEMPEST; Side-channel attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Connell, C. D. (2019). Exploiting quasiperiodic electromagnetic radiation using software-defined radio. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/290902

Chicago Manual of Style (16th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Doctoral Dissertation, University of Cambridge. Accessed October 24, 2020. https://www.repository.cam.ac.uk/handle/1810/290902.

MLA Handbook (7th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Web. 24 Oct 2020.

Vancouver:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Internet] [Doctoral dissertation]. University of Cambridge; 2019. [cited 2020 Oct 24]. Available from: https://www.repository.cam.ac.uk/handle/1810/290902.

Council of Science Editors:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Doctoral Dissertation]. University of Cambridge; 2019. Available from: https://www.repository.cam.ac.uk/handle/1810/290902


Université Catholique de Louvain

13. Journault, Anthony. Higher-order masking : from block cipher design to secure and efficient implementations.

Degree: 2018, Université Catholique de Louvain

Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implementations. They exploit observations of physical features leaked by a device while… (more)

Subjects/Keywords: Side-channel; Cryptography; Masking; Block cipher design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Journault, A. (2018). Higher-order masking : from block cipher design to secure and efficient implementations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/207925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Journault, Anthony. “Higher-order masking : from block cipher design to secure and efficient implementations.” 2018. Thesis, Université Catholique de Louvain. Accessed October 24, 2020. http://hdl.handle.net/2078.1/207925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Journault, Anthony. “Higher-order masking : from block cipher design to secure and efficient implementations.” 2018. Web. 24 Oct 2020.

Vancouver:

Journault A. Higher-order masking : from block cipher design to secure and efficient implementations. [Internet] [Thesis]. Université Catholique de Louvain; 2018. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/2078.1/207925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Journault A. Higher-order masking : from block cipher design to secure and efficient implementations. [Thesis]. Université Catholique de Louvain; 2018. Available from: http://hdl.handle.net/2078.1/207925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

14. Durvaux, François. Towards fair side-channel security evaluations.

Degree: 2015, Université Catholique de Louvain

Side-channel attacks appeared for the first time in the late 90's. They rely on the observation that the physical features of a cryptographic device may… (more)

Subjects/Keywords: Side-channel; Security; Evaluations; Electronics; Embedded

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Durvaux, F. (2015). Towards fair side-channel security evaluations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/165077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Durvaux, François. “Towards fair side-channel security evaluations.” 2015. Thesis, Université Catholique de Louvain. Accessed October 24, 2020. http://hdl.handle.net/2078.1/165077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Durvaux, François. “Towards fair side-channel security evaluations.” 2015. Web. 24 Oct 2020.

Vancouver:

Durvaux F. Towards fair side-channel security evaluations. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/2078.1/165077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Durvaux F. Towards fair side-channel security evaluations. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/165077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

15. Venkatachalam, Pradeep (author). S-Net, A Neural Network Based Countermeasure for AES.

Degree: 2019, Delft University of Technology

 Hardware implementations of encryption schemes are unprotected against side-channel analysis techniques. Physical realizations of secure algorithms leak side-channel information through power, noise, time, sound and… (more)

Subjects/Keywords: Side-Channel Attacks; Hardware Security; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venkatachalam, P. (. (2019). S-Net, A Neural Network Based Countermeasure for AES. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795

Chicago Manual of Style (16th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Masters Thesis, Delft University of Technology. Accessed October 24, 2020. http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

MLA Handbook (7th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Web. 24 Oct 2020.

Vancouver:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Oct 24]. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

Council of Science Editors:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795


Delft University of Technology

16. Aljuffri, Abdullah (author). Exploring Deep Learning for Hardware Attacks.

Degree: 2018, Delft University of Technology

 The international community firmly recognizes cyber-attacks as a serious fear that could endanger the global economy. The Global Risks 2015 report, published by the World… (more)

Subjects/Keywords: Hardware; Security; Deep Learning; Side Channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aljuffri, A. (. (2018). Exploring Deep Learning for Hardware Attacks. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f

Chicago Manual of Style (16th Edition):

Aljuffri, Abdullah (author). “Exploring Deep Learning for Hardware Attacks.” 2018. Masters Thesis, Delft University of Technology. Accessed October 24, 2020. http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f.

MLA Handbook (7th Edition):

Aljuffri, Abdullah (author). “Exploring Deep Learning for Hardware Attacks.” 2018. Web. 24 Oct 2020.

Vancouver:

Aljuffri A(. Exploring Deep Learning for Hardware Attacks. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Oct 24]. Available from: http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f.

Council of Science Editors:

Aljuffri A(. Exploring Deep Learning for Hardware Attacks. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f


University of Ontario Institute of Technology

17. Moore, Brent. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.

Degree: 2015, University of Ontario Institute of Technology

Side-Channel communication is a form of traffic in which malicious parties communicate secretly over a wireless network. This is often established through the modification of… (more)

Subjects/Keywords: Side-channel; MANETs; Hamming distance; Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moore, B. (2015). Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moore, Brent. “Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.” 2015. Thesis, University of Ontario Institute of Technology. Accessed October 24, 2020. http://hdl.handle.net/10155/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moore, Brent. “Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.” 2015. Web. 24 Oct 2020.

Vancouver:

Moore B. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. [Internet] [Thesis]. University of Ontario Institute of Technology; 2015. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/10155/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moore B. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. [Thesis]. University of Ontario Institute of Technology; 2015. Available from: http://hdl.handle.net/10155/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Irazoki, Gorka. Cross-core Microarchitectural Attacks and Countermeasures.

Degree: PhD, 2017, Worcester Polytechnic Institute

 In the last decade, multi-threaded systems and resource sharing have brought a number of technologies that facilitate our daily tasks in a way we never… (more)

Subjects/Keywords: Microarchitectural attacks; cache attacks; side channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irazoki, G. (2017). Cross-core Microarchitectural Attacks and Countermeasures. (Doctoral Dissertation). Worcester Polytechnic Institute. Retrieved from etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160

Chicago Manual of Style (16th Edition):

Irazoki, Gorka. “Cross-core Microarchitectural Attacks and Countermeasures.” 2017. Doctoral Dissertation, Worcester Polytechnic Institute. Accessed October 24, 2020. etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160.

MLA Handbook (7th Edition):

Irazoki, Gorka. “Cross-core Microarchitectural Attacks and Countermeasures.” 2017. Web. 24 Oct 2020.

Vancouver:

Irazoki G. Cross-core Microarchitectural Attacks and Countermeasures. [Internet] [Doctoral dissertation]. Worcester Polytechnic Institute; 2017. [cited 2020 Oct 24]. Available from: etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160.

Council of Science Editors:

Irazoki G. Cross-core Microarchitectural Attacks and Countermeasures. [Doctoral Dissertation]. Worcester Polytechnic Institute; 2017. Available from: etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160


Clemson University

19. Ashworth, James. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.

Degree: MS, Electrical Engineering, 2012, Clemson University

  In this work, we extend previous work done on removing anonymity from The Onion Routing network (Tor). We explore previous techniques for removing Tor's… (more)

Subjects/Keywords: Network Security; Side-Channel Attack; Tor; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ashworth, J. (2012). Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/1344

Chicago Manual of Style (16th Edition):

Ashworth, James. “Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.” 2012. Masters Thesis, Clemson University. Accessed October 24, 2020. https://tigerprints.clemson.edu/all_theses/1344.

MLA Handbook (7th Edition):

Ashworth, James. “Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.” 2012. Web. 24 Oct 2020.

Vancouver:

Ashworth J. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. [Internet] [Masters thesis]. Clemson University; 2012. [cited 2020 Oct 24]. Available from: https://tigerprints.clemson.edu/all_theses/1344.

Council of Science Editors:

Ashworth J. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. [Masters Thesis]. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_theses/1344


Virginia Tech

20. Coleman, Flora Anne. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.

Degree: MS, Computer Engineering, 2020, Virginia Tech

 In today's society, interactions with connected, data-sharing devices have become common. For example, devices like "smart" watches, remote access home security systems, and even connected… (more)

Subjects/Keywords: Lightweight Cryptography; Side Channel Analysis; FPGA; ARX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coleman, F. A. (2020). A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98758

Chicago Manual of Style (16th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Masters Thesis, Virginia Tech. Accessed October 24, 2020. http://hdl.handle.net/10919/98758.

MLA Handbook (7th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Web. 24 Oct 2020.

Vancouver:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/10919/98758.

Council of Science Editors:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98758


University of Cambridge

21. O'Connell, Christian David. Exploiting quasiperiodic electromagnetic radiation using software-defined radio.

Degree: PhD, 2019, University of Cambridge

 Electronic devices emanate unintentional electromagnetic radiation from which an attacker can extract sensitive information. In video display units these are quasiperiodic: nearly periodic in the… (more)

Subjects/Keywords: Digital Signal Processing; TEMPEST; Side-channel attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Connell, C. D. (2019). Exploiting quasiperiodic electromagnetic radiation using software-defined radio. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655

Chicago Manual of Style (16th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Doctoral Dissertation, University of Cambridge. Accessed October 24, 2020. https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655.

MLA Handbook (7th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Web. 24 Oct 2020.

Vancouver:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Internet] [Doctoral dissertation]. University of Cambridge; 2019. [cited 2020 Oct 24]. Available from: https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655.

Council of Science Editors:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Doctoral Dissertation]. University of Cambridge; 2019. Available from: https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655


Virginia Tech

22. Patrick, Conor Persson. Software Protection Against Fault and Side Channel Attacks.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 Embedded systems are increasingly ubiquitous. Many of them have security requirements such as smart cards, mobile phones, and internet connected appliances. It can be a… (more)

Subjects/Keywords: Fault attacks; side channel analysis; countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patrick, C. P. (2017). Software Protection Against Fault and Side Channel Attacks. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78685

Chicago Manual of Style (16th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Masters Thesis, Virginia Tech. Accessed October 24, 2020. http://hdl.handle.net/10919/78685.

MLA Handbook (7th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Web. 24 Oct 2020.

Vancouver:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/10919/78685.

Council of Science Editors:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78685


Penn State University

23. Gattu, Navyata. Analysis and detection of power side channel attack.

Degree: 2020, Penn State University

Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels have been explored to extract the keys,… (more)

Subjects/Keywords: Power side channel attack; Side channel attack resistance; Ring oscillator; Phase difference; Frequency difference

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gattu, N. (2020). Analysis and detection of power side channel attack. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17652nug323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gattu, Navyata. “Analysis and detection of power side channel attack.” 2020. Thesis, Penn State University. Accessed October 24, 2020. https://submit-etda.libraries.psu.edu/catalog/17652nug323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gattu, Navyata. “Analysis and detection of power side channel attack.” 2020. Web. 24 Oct 2020.

Vancouver:

Gattu N. Analysis and detection of power side channel attack. [Internet] [Thesis]. Penn State University; 2020. [cited 2020 Oct 24]. Available from: https://submit-etda.libraries.psu.edu/catalog/17652nug323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gattu N. Analysis and detection of power side channel attack. [Thesis]. Penn State University; 2020. Available from: https://submit-etda.libraries.psu.edu/catalog/17652nug323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Ordas, Sébastien. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.

Degree: Docteur es, Systèmes automatiques et microélectroniques, 2015, Montpellier

La consommation des circuits intégrés n'a cessé d'augmenter cette dernière décennie. Avec l'augmentation du prix de l'énergie et la démocratisation des systèmes embarqués, des méthodes… (more)

Subjects/Keywords: Attaques; Side-Channel; Consommation; Injection de fautes; Attacks; Side-Channel; Power Consumption; Faults injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ordas, S. (2015). Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. (Doctoral Dissertation). Montpellier. Retrieved from http://www.theses.fr/2015MONTS023

Chicago Manual of Style (16th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Doctoral Dissertation, Montpellier. Accessed October 24, 2020. http://www.theses.fr/2015MONTS023.

MLA Handbook (7th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Web. 24 Oct 2020.

Vancouver:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Internet] [Doctoral dissertation]. Montpellier; 2015. [cited 2020 Oct 24]. Available from: http://www.theses.fr/2015MONTS023.

Council of Science Editors:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Doctoral Dissertation]. Montpellier; 2015. Available from: http://www.theses.fr/2015MONTS023


Georgia Tech

25. Nguyen, Ngoc Luong Ngoc. New side-channel and techniques for hardware trojan detection.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 The thesis introduces a new physical side-channel, which we call the backscattering side-channel, and propose novel hardware Trojan (HT) and counterfeit integrated circuit (IC) detection… (more)

Subjects/Keywords: Hardware trojan; Side channel; Hardware security; Backscattering side channel; ASIC security; FPGA; Counterfeit IC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, N. L. N. (2020). New side-channel and techniques for hardware trojan detection. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62821

Chicago Manual of Style (16th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Doctoral Dissertation, Georgia Tech. Accessed October 24, 2020. http://hdl.handle.net/1853/62821.

MLA Handbook (7th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Web. 24 Oct 2020.

Vancouver:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/1853/62821.

Council of Science Editors:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62821


Delft University of Technology

26. Tubbing, Rico (author). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.

Degree: 2019, Delft University of Technology

A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume… (more)

Subjects/Keywords: Side-Channel Attacks; Deep Learning; Profiled Side-channel Attack; Convolutional Neural Networks; Spread; Portability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tubbing, R. (. (2019). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232

Chicago Manual of Style (16th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Masters Thesis, Delft University of Technology. Accessed October 24, 2020. http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

MLA Handbook (7th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Web. 24 Oct 2020.

Vancouver:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Oct 24]. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

Council of Science Editors:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232


Virginia Tech

27. Sinha, Ambuj Sudhir. Design Techniques for Side-channel Resistant Embedded Software.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

Side Channel Attacks (SCA) are a class of passive attacks on cryptosystems that exploit implementation characteristics of the system. Currently, a lot of research is… (more)

Subjects/Keywords: Bitslice Cryptography; Side Channel Attacks; Virtual Secure Circuit; Secure Embedded Systems; Side-channel Countermeasures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sinha, A. S. (2011). Design Techniques for Side-channel Resistant Embedded Software. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34465

Chicago Manual of Style (16th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Masters Thesis, Virginia Tech. Accessed October 24, 2020. http://hdl.handle.net/10919/34465.

MLA Handbook (7th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Web. 24 Oct 2020.

Vancouver:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/10919/34465.

Council of Science Editors:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/34465


Queens University

28. Godfrey, Michael. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .

Degree: Computing, 2013, Queens University

 As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage… (more)

Subjects/Keywords: CPU Cache ; Server Side Defense ; Cloud Computing ; Security ; Side Channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Godfrey, M. (2013). On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Thesis, Queens University. Accessed October 24, 2020. http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Web. 24 Oct 2020.

Vancouver:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Internet] [Thesis]. Queens University; 2013. [cited 2020 Oct 24]. Available from: http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Thesis]. Queens University; 2013. Available from: http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Lakshminarasimhan, Ashwin. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  With more and more ICs being used in sectors requiring confidentiality and integrity like payment systems, military, finance and health, there is a lot… (more)

Subjects/Keywords: Side-Channel Analysis; Electromagnetic side channel; Trojans; Watermarks; Electrical and Computer Engineering; VLSI and Circuits, Embedded and Hardware Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshminarasimhan, A. (2011). Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/693

Chicago Manual of Style (16th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Masters Thesis, University of Massachusetts. Accessed October 24, 2020. https://scholarworks.umass.edu/theses/693.

MLA Handbook (7th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Web. 24 Oct 2020.

Vancouver:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2020 Oct 24]. Available from: https://scholarworks.umass.edu/theses/693.

Council of Science Editors:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/693


RMIT University

30. Medos, S. Fault attacks and countermeasures for elliptic curve cryptosystems.

Degree: 2009, RMIT University

 In this thesis we have developed a new algorithmic countermeasures that protect elliptic curve computation by protecting computation of the finite binary extension field, against… (more)

Subjects/Keywords: Fields of Research; Side channel attack; fault attack; elliptic curve cryptosystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medos, S. (2009). Fault attacks and countermeasures for elliptic curve cryptosystems. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Thesis, RMIT University. Accessed October 24, 2020. http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Web. 24 Oct 2020.

Vancouver:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Internet] [Thesis]. RMIT University; 2009. [cited 2020 Oct 24]. Available from: http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Thesis]. RMIT University; 2009. Available from: http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9]

.