Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(side channel). Showing records 1 – 30 of 271 total matches.

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


Université Catholique de Louvain

1. Grosso, Vincent. Towards side-channel secure block ciphers.

Degree: 2015, Université Catholique de Louvain

Since the late 90's side-channel attacks have been a threat for cryptographic implementations. They use observations of physical features of a device while it computes… (more)

Subjects/Keywords: Side-channel; Masking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grosso, V. (2015). Towards side-channel secure block ciphers. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/169211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Grosso, Vincent. “Towards side-channel secure block ciphers.” 2015. Thesis, Université Catholique de Louvain. Accessed February 27, 2021. http://hdl.handle.net/2078.1/169211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Grosso, Vincent. “Towards side-channel secure block ciphers.” 2015. Web. 27 Feb 2021.

Vancouver:

Grosso V. Towards side-channel secure block ciphers. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/2078.1/169211.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Grosso V. Towards side-channel secure block ciphers. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/169211

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

2. -7290-5050. Broad-based side-channel defenses for modern microprocessors.

Degree: PhD, Computer Science, 2019, University of Texas – Austin

 Private or confidential information is used in a wide variety of applications, not just including implementations of cryptographic algorithms but also including machine-learning libraries, databases,… (more)

Subjects/Keywords: Side-channel defenses

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-7290-5050. (2019). Broad-based side-channel defenses for modern microprocessors. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2661

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-7290-5050. “Broad-based side-channel defenses for modern microprocessors.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed February 27, 2021. http://dx.doi.org/10.26153/tsw/2661.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-7290-5050. “Broad-based side-channel defenses for modern microprocessors.” 2019. Web. 27 Feb 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-7290-5050. Broad-based side-channel defenses for modern microprocessors. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2021 Feb 27]. Available from: http://dx.doi.org/10.26153/tsw/2661.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-7290-5050. Broad-based side-channel defenses for modern microprocessors. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/2661

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Clemson University

3. Sun, Fei. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.

Degree: MS, Electrical and Computer Engineering (Holcomb Dept. of), 2020, Clemson University

  Applications using dedicated short-range communication (DSRC) are being developed to prevent automobile accidents. Many DSRC implementations, applications and network stacks are not mature. They… (more)

Subjects/Keywords: DSRC; HMM; side channel analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, F. (2020). Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/3429

Chicago Manual of Style (16th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Masters Thesis, Clemson University. Accessed February 27, 2021. https://tigerprints.clemson.edu/all_theses/3429.

MLA Handbook (7th Edition):

Sun, Fei. “Security Evaluation of a Dedicated Short Range Communications (DSRC) Application.” 2020. Web. 27 Feb 2021.

Vancouver:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Internet] [Masters thesis]. Clemson University; 2020. [cited 2021 Feb 27]. Available from: https://tigerprints.clemson.edu/all_theses/3429.

Council of Science Editors:

Sun F. Security Evaluation of a Dedicated Short Range Communications (DSRC) Application. [Masters Thesis]. Clemson University; 2020. Available from: https://tigerprints.clemson.edu/all_theses/3429


Oregon State University

4. Yoo, Jaewon. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.

Degree: MS, Electrical and Computer Engineering, 2008, Oregon State University

 The Advent of multi-cores allows programs to be executed much faster than before. Cryptoalgorithms use long-bit words thus parallelizing these operations on multi-cores will achieve… (more)

Subjects/Keywords: Side Channel Attack; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yoo, J. (2008). Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. (Masters Thesis). Oregon State University. Retrieved from http://hdl.handle.net/1957/8927

Chicago Manual of Style (16th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Masters Thesis, Oregon State University. Accessed February 27, 2021. http://hdl.handle.net/1957/8927.

MLA Handbook (7th Edition):

Yoo, Jaewon. “Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency.” 2008. Web. 27 Feb 2021.

Vancouver:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Internet] [Masters thesis]. Oregon State University; 2008. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/1957/8927.

Council of Science Editors:

Yoo J. Side channel attack resistant elliptic curves cryptosystem on multi-cores for power efficiency. [Masters Thesis]. Oregon State University; 2008. Available from: http://hdl.handle.net/1957/8927


Université Catholique de Louvain

5. Renauld, Mathieu. Advanced extraction and exploitation of side-channel information in cryptographic implementations.

Degree: 2012, Université Catholique de Louvain

With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartcards, car keys,...). Many of these applications require security or privacy features for which… (more)

Subjects/Keywords: Cryptography; Side-Channel Cryptanalysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Renauld, M. (2012). Advanced extraction and exploitation of side-channel information in cryptographic implementations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/115152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Renauld, Mathieu. “Advanced extraction and exploitation of side-channel information in cryptographic implementations.” 2012. Thesis, Université Catholique de Louvain. Accessed February 27, 2021. http://hdl.handle.net/2078.1/115152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Renauld, Mathieu. “Advanced extraction and exploitation of side-channel information in cryptographic implementations.” 2012. Web. 27 Feb 2021.

Vancouver:

Renauld M. Advanced extraction and exploitation of side-channel information in cryptographic implementations. [Internet] [Thesis]. Université Catholique de Louvain; 2012. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/2078.1/115152.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Renauld M. Advanced extraction and exploitation of side-channel information in cryptographic implementations. [Thesis]. Université Catholique de Louvain; 2012. Available from: http://hdl.handle.net/2078.1/115152

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

6. van Tienen, Freek (author). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.

Degree: 2018, Delft University of Technology

 In almost every device cryptographic functions are used to protect data and sensitive information from being intercepted. A commonly used encryption algorithm is the Advanced… (more)

Subjects/Keywords: Side-Channel Attacks; AES; Electromagnetic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van Tienen, F. (. (2018). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b

Chicago Manual of Style (16th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Masters Thesis, Delft University of Technology. Accessed February 27, 2021. http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

MLA Handbook (7th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Web. 27 Feb 2021.

Vancouver:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Feb 27]. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

Council of Science Editors:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b


University of Minnesota

7. Paulsen, Brandon. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.

Degree: MS, Computer Science, 2017, University of Minnesota

 Compression side-channel attacks like CRIME and BREACH have made compression a liability even though it is a powerful tool for improving efficiency. We present debreach,… (more)

Subjects/Keywords: BREACH; compression; security; side channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Paulsen, B. (2017). debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. (Masters Thesis). University of Minnesota. Retrieved from http://hdl.handle.net/11299/190584

Chicago Manual of Style (16th Edition):

Paulsen, Brandon. “debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.” 2017. Masters Thesis, University of Minnesota. Accessed February 27, 2021. http://hdl.handle.net/11299/190584.

MLA Handbook (7th Edition):

Paulsen, Brandon. “debreach: Selective Dictionary Compression to Prevent BREACH and CRIME.” 2017. Web. 27 Feb 2021.

Vancouver:

Paulsen B. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. [Internet] [Masters thesis]. University of Minnesota; 2017. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/11299/190584.

Council of Science Editors:

Paulsen B. debreach: Selective Dictionary Compression to Prevent BREACH and CRIME. [Masters Thesis]. University of Minnesota; 2017. Available from: http://hdl.handle.net/11299/190584


Georgia Tech

8. Shih, Mingwei. Securing Intel SGX against side-channel attacks via load-time synthesis.

Degree: PhD, Computer Science, 2019, Georgia Tech

 In response to the growing need for securing user data in the cloud, recent Intel processors have supported a new feature, Intel Software Guard Extensions… (more)

Subjects/Keywords: Intel SGX; Side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shih, M. (2019). Securing Intel SGX against side-channel attacks via load-time synthesis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62337

Chicago Manual of Style (16th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Doctoral Dissertation, Georgia Tech. Accessed February 27, 2021. http://hdl.handle.net/1853/62337.

MLA Handbook (7th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Web. 27 Feb 2021.

Vancouver:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/1853/62337.

Council of Science Editors:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62337


University of Newcastle

9. Asadi, Behzad. Broadcast channels with receiver message side information.

Degree: PhD, 2017, University of Newcastle

Research Doctorate - Doctor of Philosophy (PhD)

In this thesis, we investigate the capacity region of broadcast channels where each receiver may partially or fully… (more)

Subjects/Keywords: broadcast channel; side information; capacity region

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Asadi, B. (2017). Broadcast channels with receiver message side information. (Doctoral Dissertation). University of Newcastle. Retrieved from http://hdl.handle.net/1959.13/1333509

Chicago Manual of Style (16th Edition):

Asadi, Behzad. “Broadcast channels with receiver message side information.” 2017. Doctoral Dissertation, University of Newcastle. Accessed February 27, 2021. http://hdl.handle.net/1959.13/1333509.

MLA Handbook (7th Edition):

Asadi, Behzad. “Broadcast channels with receiver message side information.” 2017. Web. 27 Feb 2021.

Vancouver:

Asadi B. Broadcast channels with receiver message side information. [Internet] [Doctoral dissertation]. University of Newcastle; 2017. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/1959.13/1333509.

Council of Science Editors:

Asadi B. Broadcast channels with receiver message side information. [Doctoral Dissertation]. University of Newcastle; 2017. Available from: http://hdl.handle.net/1959.13/1333509


University of Houston

10. Lu, Xi 1993-. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.

Degree: MS, Computer Science, 2017, University of Houston

 In order to make apps functional, mobile operating systems, such as Android, allow applications to access some system data without asking for user permission. We… (more)

Subjects/Keywords: Vulnerability; Side channel; Mobile phone; Smartphone; Android

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, X. 1. (2017). Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. (Masters Thesis). University of Houston. Retrieved from http://hdl.handle.net/10657/4551

Chicago Manual of Style (16th Edition):

Lu, Xi 1993-. “Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.” 2017. Masters Thesis, University of Houston. Accessed February 27, 2021. http://hdl.handle.net/10657/4551.

MLA Handbook (7th Edition):

Lu, Xi 1993-. “Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities.” 2017. Web. 27 Feb 2021.

Vancouver:

Lu X1. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. [Internet] [Masters thesis]. University of Houston; 2017. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10657/4551.

Council of Science Editors:

Lu X1. Malicious Apps May Exploit Smartphone's Vulnerabilities to Detect User Activities. [Masters Thesis]. University of Houston; 2017. Available from: http://hdl.handle.net/10657/4551


University of Cambridge

11. O'Connell, Christian David. Exploiting quasiperiodic electromagnetic radiation using software-defined radio.

Degree: PhD, 2019, University of Cambridge

 Electronic devices emanate unintentional electromagnetic radiation from which an attacker can extract sensitive information. In video display units these are quasiperiodic: nearly periodic in the… (more)

Subjects/Keywords: Digital Signal Processing; TEMPEST; Side-channel attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Connell, C. D. (2019). Exploiting quasiperiodic electromagnetic radiation using software-defined radio. (Doctoral Dissertation). University of Cambridge. Retrieved from https://www.repository.cam.ac.uk/handle/1810/290902

Chicago Manual of Style (16th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Doctoral Dissertation, University of Cambridge. Accessed February 27, 2021. https://www.repository.cam.ac.uk/handle/1810/290902.

MLA Handbook (7th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Web. 27 Feb 2021.

Vancouver:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Internet] [Doctoral dissertation]. University of Cambridge; 2019. [cited 2021 Feb 27]. Available from: https://www.repository.cam.ac.uk/handle/1810/290902.

Council of Science Editors:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Doctoral Dissertation]. University of Cambridge; 2019. Available from: https://www.repository.cam.ac.uk/handle/1810/290902


Université Catholique de Louvain

12. Journault, Anthony. Higher-order masking : from block cipher design to secure and efficient implementations.

Degree: 2018, Université Catholique de Louvain

Introduced in the late 90's, side-channel attacks are an important threat for cryptographic implementations. They exploit observations of physical features leaked by a device while… (more)

Subjects/Keywords: Side-channel; Cryptography; Masking; Block cipher design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Journault, A. (2018). Higher-order masking : from block cipher design to secure and efficient implementations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/207925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Journault, Anthony. “Higher-order masking : from block cipher design to secure and efficient implementations.” 2018. Thesis, Université Catholique de Louvain. Accessed February 27, 2021. http://hdl.handle.net/2078.1/207925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Journault, Anthony. “Higher-order masking : from block cipher design to secure and efficient implementations.” 2018. Web. 27 Feb 2021.

Vancouver:

Journault A. Higher-order masking : from block cipher design to secure and efficient implementations. [Internet] [Thesis]. Université Catholique de Louvain; 2018. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/2078.1/207925.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Journault A. Higher-order masking : from block cipher design to secure and efficient implementations. [Thesis]. Université Catholique de Louvain; 2018. Available from: http://hdl.handle.net/2078.1/207925

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université Catholique de Louvain

13. Durvaux, François. Towards fair side-channel security evaluations.

Degree: 2015, Université Catholique de Louvain

Side-channel attacks appeared for the first time in the late 90's. They rely on the observation that the physical features of a cryptographic device may… (more)

Subjects/Keywords: Side-channel; Security; Evaluations; Electronics; Embedded

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Durvaux, F. (2015). Towards fair side-channel security evaluations. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/165077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Durvaux, François. “Towards fair side-channel security evaluations.” 2015. Thesis, Université Catholique de Louvain. Accessed February 27, 2021. http://hdl.handle.net/2078.1/165077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Durvaux, François. “Towards fair side-channel security evaluations.” 2015. Web. 27 Feb 2021.

Vancouver:

Durvaux F. Towards fair side-channel security evaluations. [Internet] [Thesis]. Université Catholique de Louvain; 2015. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/2078.1/165077.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Durvaux F. Towards fair side-channel security evaluations. [Thesis]. Université Catholique de Louvain; 2015. Available from: http://hdl.handle.net/2078.1/165077

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

14. Venkatachalam, Pradeep (author). S-Net, A Neural Network Based Countermeasure for AES.

Degree: 2019, Delft University of Technology

 Hardware implementations of encryption schemes are unprotected against side-channel analysis techniques. Physical realizations of secure algorithms leak side-channel information through power, noise, time, sound and… (more)

Subjects/Keywords: Side-Channel Attacks; Hardware Security; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venkatachalam, P. (. (2019). S-Net, A Neural Network Based Countermeasure for AES. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795

Chicago Manual of Style (16th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Masters Thesis, Delft University of Technology. Accessed February 27, 2021. http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

MLA Handbook (7th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Web. 27 Feb 2021.

Vancouver:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2021 Feb 27]. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

Council of Science Editors:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795


Delft University of Technology

15. Aljuffri, Abdullah (author). Exploring Deep Learning for Hardware Attacks.

Degree: 2018, Delft University of Technology

 The international community firmly recognizes cyber-attacks as a serious fear that could endanger the global economy. The Global Risks 2015 report, published by the World… (more)

Subjects/Keywords: Hardware; Security; Deep Learning; Side Channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aljuffri, A. (. (2018). Exploring Deep Learning for Hardware Attacks. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f

Chicago Manual of Style (16th Edition):

Aljuffri, Abdullah (author). “Exploring Deep Learning for Hardware Attacks.” 2018. Masters Thesis, Delft University of Technology. Accessed February 27, 2021. http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f.

MLA Handbook (7th Edition):

Aljuffri, Abdullah (author). “Exploring Deep Learning for Hardware Attacks.” 2018. Web. 27 Feb 2021.

Vancouver:

Aljuffri A(. Exploring Deep Learning for Hardware Attacks. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2021 Feb 27]. Available from: http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f.

Council of Science Editors:

Aljuffri A(. Exploring Deep Learning for Hardware Attacks. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:c0dddd21-bdc1-4641-bd5d-4abdbd7fe35f


University of Ontario Institute of Technology

16. Moore, Brent. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.

Degree: 2015, University of Ontario Institute of Technology

Side-Channel communication is a form of traffic in which malicious parties communicate secretly over a wireless network. This is often established through the modification of… (more)

Subjects/Keywords: Side-channel; MANETs; Hamming distance; Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moore, B. (2015). Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. (Thesis). University of Ontario Institute of Technology. Retrieved from http://hdl.handle.net/10155/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Moore, Brent. “Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.” 2015. Thesis, University of Ontario Institute of Technology. Accessed February 27, 2021. http://hdl.handle.net/10155/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Moore, Brent. “Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric.” 2015. Web. 27 Feb 2021.

Vancouver:

Moore B. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. [Internet] [Thesis]. University of Ontario Institute of Technology; 2015. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10155/562.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Moore B. Detection of side-channel communication in a mobile ad-hoc network environment using the Hamming distance metric. [Thesis]. University of Ontario Institute of Technology; 2015. Available from: http://hdl.handle.net/10155/562

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Clemson University

17. Ashworth, James. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.

Degree: MS, Electrical Engineering, 2012, Clemson University

  In this work, we extend previous work done on removing anonymity from The Onion Routing network (Tor). We explore previous techniques for removing Tor's… (more)

Subjects/Keywords: Network Security; Side-Channel Attack; Tor; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ashworth, J. (2012). Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/1344

Chicago Manual of Style (16th Edition):

Ashworth, James. “Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.” 2012. Masters Thesis, Clemson University. Accessed February 27, 2021. https://tigerprints.clemson.edu/all_theses/1344.

MLA Handbook (7th Edition):

Ashworth, James. “Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network.” 2012. Web. 27 Feb 2021.

Vancouver:

Ashworth J. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. [Internet] [Masters thesis]. Clemson University; 2012. [cited 2021 Feb 27]. Available from: https://tigerprints.clemson.edu/all_theses/1344.

Council of Science Editors:

Ashworth J. Piercing the Cloud and Marking the Onion: Removing the Anonymity of the Tor Network. [Masters Thesis]. Clemson University; 2012. Available from: https://tigerprints.clemson.edu/all_theses/1344


Virginia Tech

18. Coleman, Flora Anne. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.

Degree: MS, Computer Engineering, 2020, Virginia Tech

 In today's society, interactions with connected, data-sharing devices have become common. For example, devices like "smart" watches, remote access home security systems, and even connected… (more)

Subjects/Keywords: Lightweight Cryptography; Side Channel Analysis; FPGA; ARX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coleman, F. A. (2020). A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/98758

Chicago Manual of Style (16th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Masters Thesis, Virginia Tech. Accessed February 27, 2021. http://hdl.handle.net/10919/98758.

MLA Handbook (7th Edition):

Coleman, Flora Anne. “A Hardware Evaluation of a NIST Lightweight Cryptography Candidate.” 2020. Web. 27 Feb 2021.

Vancouver:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Internet] [Masters thesis]. Virginia Tech; 2020. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10919/98758.

Council of Science Editors:

Coleman FA. A Hardware Evaluation of a NIST Lightweight Cryptography Candidate. [Masters Thesis]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/98758


University of Cambridge

19. O'Connell, Christian David. Exploiting quasiperiodic electromagnetic radiation using software-defined radio.

Degree: PhD, 2019, University of Cambridge

 Electronic devices emanate unintentional electromagnetic radiation from which an attacker can extract sensitive information. In video display units these are quasiperiodic: nearly periodic in the… (more)

Subjects/Keywords: Digital Signal Processing; TEMPEST; Side-channel attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

O'Connell, C. D. (2019). Exploiting quasiperiodic electromagnetic radiation using software-defined radio. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655

Chicago Manual of Style (16th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Doctoral Dissertation, University of Cambridge. Accessed February 27, 2021. https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655.

MLA Handbook (7th Edition):

O'Connell, Christian David. “Exploiting quasiperiodic electromagnetic radiation using software-defined radio.” 2019. Web. 27 Feb 2021.

Vancouver:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Internet] [Doctoral dissertation]. University of Cambridge; 2019. [cited 2021 Feb 27]. Available from: https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655.

Council of Science Editors:

O'Connell CD. Exploiting quasiperiodic electromagnetic radiation using software-defined radio. [Doctoral Dissertation]. University of Cambridge; 2019. Available from: https://doi.org/10.17863/CAM.38085 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.774655


Virginia Tech

20. Patrick, Conor Persson. Software Protection Against Fault and Side Channel Attacks.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 Embedded systems are increasingly ubiquitous. Many of them have security requirements such as smart cards, mobile phones, and internet connected appliances. It can be a… (more)

Subjects/Keywords: Fault attacks; side channel analysis; countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patrick, C. P. (2017). Software Protection Against Fault and Side Channel Attacks. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78685

Chicago Manual of Style (16th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Masters Thesis, Virginia Tech. Accessed February 27, 2021. http://hdl.handle.net/10919/78685.

MLA Handbook (7th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Web. 27 Feb 2021.

Vancouver:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10919/78685.

Council of Science Editors:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78685


Delft University of Technology

21. Arora, V. (author). Side-channel leakages: from different target devices.

Degree: 2020, Delft University of Technology

The advances in cryptography have enabled the features of confidentiality, security, and integrity in the digital space. The information about the working of the… (more)

Subjects/Keywords: Side-channel analysis; template attacks; Portability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arora, V. (. (2020). Side-channel leakages: from different target devices. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5566f6d5-2cee-4f5c-b047-7c8e36e8306f

Chicago Manual of Style (16th Edition):

Arora, V (author). “Side-channel leakages: from different target devices.” 2020. Masters Thesis, Delft University of Technology. Accessed February 27, 2021. http://resolver.tudelft.nl/uuid:5566f6d5-2cee-4f5c-b047-7c8e36e8306f.

MLA Handbook (7th Edition):

Arora, V (author). “Side-channel leakages: from different target devices.” 2020. Web. 27 Feb 2021.

Vancouver:

Arora V(. Side-channel leakages: from different target devices. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Feb 27]. Available from: http://resolver.tudelft.nl/uuid:5566f6d5-2cee-4f5c-b047-7c8e36e8306f.

Council of Science Editors:

Arora V(. Side-channel leakages: from different target devices. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:5566f6d5-2cee-4f5c-b047-7c8e36e8306f


Virginia Tech

22. Kathuria, Tarun. Gate-level Leakage Assessment and Mitigation.

Degree: MS, Computer Engineering, 2019, Virginia Tech

Side-channel leakage, caused by imperfect implementation of cryptographic algorithms in hardware, has become a serious security threat for connected devices that generate and process sensitive… (more)

Subjects/Keywords: Side-channel leakage; Countermeasures; Power analysis attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kathuria, T. (2019). Gate-level Leakage Assessment and Mitigation. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/101862

Chicago Manual of Style (16th Edition):

Kathuria, Tarun. “Gate-level Leakage Assessment and Mitigation.” 2019. Masters Thesis, Virginia Tech. Accessed February 27, 2021. http://hdl.handle.net/10919/101862.

MLA Handbook (7th Edition):

Kathuria, Tarun. “Gate-level Leakage Assessment and Mitigation.” 2019. Web. 27 Feb 2021.

Vancouver:

Kathuria T. Gate-level Leakage Assessment and Mitigation. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10919/101862.

Council of Science Editors:

Kathuria T. Gate-level Leakage Assessment and Mitigation. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/101862


Penn State University

23. Gattu, Navyata. Analysis and detection of power side channel attack.

Degree: 2020, Penn State University

Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels have been explored to extract the keys,… (more)

Subjects/Keywords: Power side channel attack; Side channel attack resistance; Ring oscillator; Phase difference; Frequency difference

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gattu, N. (2020). Analysis and detection of power side channel attack. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/17652nug323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gattu, Navyata. “Analysis and detection of power side channel attack.” 2020. Thesis, Penn State University. Accessed February 27, 2021. https://submit-etda.libraries.psu.edu/catalog/17652nug323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gattu, Navyata. “Analysis and detection of power side channel attack.” 2020. Web. 27 Feb 2021.

Vancouver:

Gattu N. Analysis and detection of power side channel attack. [Internet] [Thesis]. Penn State University; 2020. [cited 2021 Feb 27]. Available from: https://submit-etda.libraries.psu.edu/catalog/17652nug323.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gattu N. Analysis and detection of power side channel attack. [Thesis]. Penn State University; 2020. Available from: https://submit-etda.libraries.psu.edu/catalog/17652nug323

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Ordas, Sébastien. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.

Degree: Docteur es, Systèmes automatiques et microélectroniques, 2015, Montpellier

La consommation des circuits intégrés n'a cessé d'augmenter cette dernière décennie. Avec l'augmentation du prix de l'énergie et la démocratisation des systèmes embarqués, des méthodes… (more)

Subjects/Keywords: Attaques; Side-Channel; Consommation; Injection de fautes; Attacks; Side-Channel; Power Consumption; Faults injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ordas, S. (2015). Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. (Doctoral Dissertation). Montpellier. Retrieved from http://www.theses.fr/2015MONTS023

Chicago Manual of Style (16th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Doctoral Dissertation, Montpellier. Accessed February 27, 2021. http://www.theses.fr/2015MONTS023.

MLA Handbook (7th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Web. 27 Feb 2021.

Vancouver:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Internet] [Doctoral dissertation]. Montpellier; 2015. [cited 2021 Feb 27]. Available from: http://www.theses.fr/2015MONTS023.

Council of Science Editors:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Doctoral Dissertation]. Montpellier; 2015. Available from: http://www.theses.fr/2015MONTS023


Georgia Tech

25. Nguyen, Ngoc Luong Ngoc. New side-channel and techniques for hardware trojan detection.

Degree: PhD, Electrical and Computer Engineering, 2020, Georgia Tech

 The thesis introduces a new physical side-channel, which we call the backscattering side-channel, and propose novel hardware Trojan (HT) and counterfeit integrated circuit (IC) detection… (more)

Subjects/Keywords: Hardware trojan; Side channel; Hardware security; Backscattering side channel; ASIC security; FPGA; Counterfeit IC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, N. L. N. (2020). New side-channel and techniques for hardware trojan detection. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62821

Chicago Manual of Style (16th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Doctoral Dissertation, Georgia Tech. Accessed February 27, 2021. http://hdl.handle.net/1853/62821.

MLA Handbook (7th Edition):

Nguyen, Ngoc Luong Ngoc. “New side-channel and techniques for hardware trojan detection.” 2020. Web. 27 Feb 2021.

Vancouver:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Internet] [Doctoral dissertation]. Georgia Tech; 2020. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/1853/62821.

Council of Science Editors:

Nguyen NLN. New side-channel and techniques for hardware trojan detection. [Doctoral Dissertation]. Georgia Tech; 2020. Available from: http://hdl.handle.net/1853/62821


Delft University of Technology

26. Tubbing, Rico (author). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.

Degree: 2019, Delft University of Technology

A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume… (more)

Subjects/Keywords: Side-Channel Attacks; Deep Learning; Profiled Side-channel Attack; Convolutional Neural Networks; Spread; Portability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tubbing, R. (. (2019). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232

Chicago Manual of Style (16th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Masters Thesis, Delft University of Technology. Accessed February 27, 2021. http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

MLA Handbook (7th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Web. 27 Feb 2021.

Vancouver:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2021 Feb 27]. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

Council of Science Editors:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232


Virginia Tech

27. Sinha, Ambuj Sudhir. Design Techniques for Side-channel Resistant Embedded Software.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

Side Channel Attacks (SCA) are a class of passive attacks on cryptosystems that exploit implementation characteristics of the system. Currently, a lot of research is… (more)

Subjects/Keywords: Bitslice Cryptography; Side Channel Attacks; Virtual Secure Circuit; Secure Embedded Systems; Side-channel Countermeasures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sinha, A. S. (2011). Design Techniques for Side-channel Resistant Embedded Software. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34465

Chicago Manual of Style (16th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Masters Thesis, Virginia Tech. Accessed February 27, 2021. http://hdl.handle.net/10919/34465.

MLA Handbook (7th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Web. 27 Feb 2021.

Vancouver:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/10919/34465.

Council of Science Editors:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/34465


Queens University

28. Godfrey, Michael. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .

Degree: Computing, 2013, Queens University

 As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage… (more)

Subjects/Keywords: CPU Cache ; Server Side Defense ; Cloud Computing ; Security ; Side Channel

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Godfrey, M. (2013). On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Thesis, Queens University. Accessed February 27, 2021. http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Godfrey, Michael. “On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment .” 2013. Web. 27 Feb 2021.

Vancouver:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Internet] [Thesis]. Queens University; 2013. [cited 2021 Feb 27]. Available from: http://hdl.handle.net/1974/8320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Godfrey M. On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment . [Thesis]. Queens University; 2013. Available from: http://hdl.handle.net/1974/8320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Lakshminarasimhan, Ashwin. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.

Degree: MS, Electrical & Computer Engineering, 2011, University of Massachusetts

  With more and more ICs being used in sectors requiring confidentiality and integrity like payment systems, military, finance and health, there is a lot… (more)

Subjects/Keywords: Side-Channel Analysis; Electromagnetic side channel; Trojans; Watermarks; Electrical and Computer Engineering; VLSI and Circuits, Embedded and Hardware Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lakshminarasimhan, A. (2011). Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. (Masters Thesis). University of Massachusetts. Retrieved from https://scholarworks.umass.edu/theses/693

Chicago Manual of Style (16th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Masters Thesis, University of Massachusetts. Accessed February 27, 2021. https://scholarworks.umass.edu/theses/693.

MLA Handbook (7th Edition):

Lakshminarasimhan, Ashwin. “Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking.” 2011. Web. 27 Feb 2021.

Vancouver:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Internet] [Masters thesis]. University of Massachusetts; 2011. [cited 2021 Feb 27]. Available from: https://scholarworks.umass.edu/theses/693.

Council of Science Editors:

Lakshminarasimhan A. Electromagnetic Side-Channel Analysis for Hardware and Software Watermarking. [Masters Thesis]. University of Massachusetts; 2011. Available from: https://scholarworks.umass.edu/theses/693


RMIT University

30. Medos, S. Fault attacks and countermeasures for elliptic curve cryptosystems.

Degree: 2009, RMIT University

 In this thesis we have developed a new algorithmic countermeasures that protect elliptic curve computation by protecting computation of the finite binary extension field, against… (more)

Subjects/Keywords: Fields of Research; Side channel attack; fault attack; elliptic curve cryptosystem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Medos, S. (2009). Fault attacks and countermeasures for elliptic curve cryptosystems. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Thesis, RMIT University. Accessed February 27, 2021. http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Medos, S. “Fault attacks and countermeasures for elliptic curve cryptosystems.” 2009. Web. 27 Feb 2021.

Vancouver:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Internet] [Thesis]. RMIT University; 2009. [cited 2021 Feb 27]. Available from: http://researchbank.rmit.edu.au/view/rmit:160069.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Medos S. Fault attacks and countermeasures for elliptic curve cryptosystems. [Thesis]. RMIT University; 2009. Available from: http://researchbank.rmit.edu.au/view/rmit:160069

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5] [6] [7] [8] [9] [10]

.