X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
컴퓨터학 (69) 69
cryptography (37) 37
computer science (36) 36
computer science, theory & methods (32) 32
data encryption (31) 31
block cipher (29) 29
computer science, information systems (28) 28
engineering, electrical & electronic (27) 27
cryptanalysis (25) 25
algorithms (22) 22
algorithm analysis and problem complexity (21) 21
computer communication networks (21) 21
security (20) 20
management of computing and information systems (18) 18
discrete mathematics in computer science (17) 17
computer science, hardware & architecture (15) 15
telecommunications (15) 15
blocking (13) 13
computer security (13) 13
coding and information theory (11) 11
aes (10) 10
analysis (10) 10
physics (10) 10
systems and data security (10) 10
block ciphers (9) 9
computer science, software engineering (9) 9
mathematical analysis (9) 9
side-channel attacks (9) 9
computation (8) 8
electric communication technique (8) 8
electricity (8) 8
operating systems (8) 8
side-channel attack (8) 8
spectr-h64 (8) 8
systems and data security software (8) 8
transmission of digital information, e.g. telegraphiccommunication (8) 8
전자/정보통신공학 (8) 8
differential power analysis (7) 7
encryption (7) 7
multiplication (7) 7
sensors (7) 7
studies (7) 7
calculating (6) 6
complexity (6) 6
computer systems (6) 6
computing (6) 6
counting (6) 6
differential cryptanalysis (6) 6
differential fault analysis (6) 6
digital signatures (6) 6
electric digital data processing (6) 6
electronics (6) 6
mathematical models (6) 6
physics, applied (6) 6
power analysis (6) 6
provable security (6) 6
access control (5) 5
article subject (5) 5
collisions (5) 5
compressing (5) 5
computers (5) 5
countermeasure (5) 5
countermeasures (5) 5
data security (5) 5
elliptic curve cryptography (5) 5
hash based algorithms (5) 5
mathematics (5) 5
mathematics, applied (5) 5
optimization (5) 5
related-key attack (5) 5
scalars (5) 5
side channel attacks (5) 5
software (5) 5
technology (5) 5
advertising (4) 4
attack (4) 4
biology (4) 4
chemistry (4) 4
chemistry, multidisciplinary (4) 4
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (4) 4
collision attack (4) 4
communications engineering, networks (4) 4
computational complexity (4) 4
data structures, cryptology and information theory (4) 4
display (4) 4
education (4) 4
engineering. civil engineering (4) 4
faults (4) 4
hash function (4) 4
keys (4) 4
management information systems (4) 4
masking method (4) 4
materials science, multidisciplinary (4) 4
microprocessors (4) 4
polynomials (4) 4
research (4) 4
schedules (4) 4
seals (4) 4
side channel attack (4) 4
aria (3) 3
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


01/2019, ISBN 3039210017
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The... 
n/a | binary Huff curve | FPGA | post quantum cryptography | data loss | side-channel cache attacks | rsa cryptosystem | first-order analysis | chaotic circuit | integrity | ad libraries | power-analysis attack | single trace analysis | side-channel authentication | provable security | ad lib | cache misses | cache side-channel attack | leakage model | NTRU | graph | AES | hardware security | recovery of secret exponent by triangular trace analysis | side-channel attacks | information leakage | data outsourcing | CPLD | scatter-gather implementation | modular exponentiation | lattice-based cryptography | elliptic curve cryptography | Gaussian sampling | post-quantum cryptography | reliability | unified point addition | ad networks | graph similarity | mobile ads | physically unclonable function | tweakable block cipher | Merkle (hash) tree | machine-learning classification | side channel attack | online authentication | side channel analysis | financial IC card | side-channel attack | re-keying | cloud computing | cryptographic keys | chaos theory | horizontal collision correlation analysis | countermeasure | embedded system security | cache attack | single-trace attack | software development kit (SDK) | CDT sampling | key bit-dependent attack | side-channel analysis | second-order analysis | constant-time cryptographic algorithm | android package (APK) | challenge-response authentication
eBook
The Journal of Supercomputing, ISSN 0920-8542, 3/2018, Volume 74, Issue 3, pp. 1394 - 1417
Journal Article
ETRI Journal, ISSN 1225-6463, 06/2015, Volume 37, Issue 3, pp. 584 - 594
To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic... 
Journal Article
Applied sciences, ISSN 2076-3417, 05/2019, Volume 9, Issue 9, p. 1881
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...] 
Leakage | Smart cards | Multiplication | Research | Internet of Things | Deep learning | Scientific papers | Privacy | Learning algorithms | Embedded systems | Power consumption | Algorithms | Neural networks | Machine learning | International conferences | Cryptography | Computer security | Curves | n/a
Journal Article
Security and communication networks, ISSN 1939-0114, 7/2018, Volume 2018, pp. 1 - 11
The isogeny-based cryptosystem is the most recent category in the field of postquantum cryptography. However, it is widely studied due to short key sizes and... 
COMPUTER SCIENCE, INFORMATION SYSTEMS | ELLIPTIC-CURVES | TIME | TELECOMMUNICATIONS
Journal Article
ETRI Journal, ISSN 1225-6463, 04/2016, Volume 38, Issue 2, pp. 387 - 396
Journal Article
Journal of applied mathematics, ISSN 1110-757X, 9/2013, Volume 2013, pp. 1 - 6
In Choukri and Tunstall (2005), the authors showed that if they decreased the number of rounds in AES by injecting faults, it is possible to recover the secret... 
MATHEMATICS, APPLIED | KEY-RECOVERY ATTACKS | Algorithms | Research | Data security | Mathematical research | Faults | Computation | Mathematical analysis | Mathematical models | Security | Recovery | Hash based algorithms | Complexity
Journal Article
Peer-to-Peer Networking and Applications, ISSN 1936-6442, 7/2015, Volume 8, Issue 4, pp. 716 - 732
Journal Article
Mathematical and Computer Modelling, ISSN 0895-7177, 2012, Volume 55, Issue 1, pp. 26 - 34
SEED is a Korean standard block cipher, and it is chosen as a 128-bit ISO/IEC standard block cipher together with AES and Camellia. In this paper, we propose a... 
Differential fault analysis | Block cipher | SEED | MATHEMATICS, APPLIED
Journal Article
Journal of Parallel and Distributed Computing, ISSN 0743-7315, 01/2015, Volume 75, pp. 152 - 167
In this paper, we present PEG (Parallel ECC library on GPU), which is efficient implementation of Elliptic Curve Scalar Multiplication over GF(2m) on Graphic... 
CUDA | Parallel cryptographic computation | Graphic Processing Units (GPUs) | Elliptic Curve Cryptosystem (ECC) | COMPUTER SCIENCE, THEORY & METHODS | Systems and data security software | Analysis | Algorithms
Journal Article
Journal of applied mathematics, ISSN 1110-757X, 11/2013, Volume 2013, pp. 1 - 10
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256,... 
MATHEMATICS, APPLIED | RFID TAGS | CRYPTON | SECURITY | CRYPTANALYSIS | SENSORS | LIGHTWEIGHT BLOCK CIPHER | Safety and security measures | Data security | Engineering research | Mathematical research | Advanced Encryption Standard | Research | Computer crimes | Blocking | Mathematical analysis
Journal Article
Discrete Mathematics, ISSN 0012-365X, 2010, Volume 310, Issue 5, pp. 988 - 1002
The general strategy of impossible differential cryptanalysis is to first find impossible differentials and then exploit them for retrieving subkey material... 
Rijndael | Impossible differential cryptanalysis | Cryptanalysis | Matrix method | Feistel | Skipjack | Block ciphers | MATHEMATICS | SECURITY
Journal Article
International Journal of Distributed Sensor Networks, ISSN 1550-1329, 1/2014, Volume 10, Issue 1, p. 389476
PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. In this paper, we propose... 
COMPUTER SCIENCE, INFORMATION SYSTEMS | BLOCK CIPHER | TELECOMMUNICATIONS | Ciphers | Data security | Engineering research | Cryptography | Methods | Data encryption | Computer security | Colleges & universities | Networks | Computation | Keys | Blocking | Sensors | Complexity
Journal Article
2017, Lecture Notes in Computer Science, ISBN 9783319531762, Volume 10157
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South... 
Computer science | Data encryption (Computer science) | Management information systems | Computer security
Web Resource
ETRI Journal, ISSN 1225-6463, 04/2020, Volume 42, Issue 2, pp. 292 - 304
As side-channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine... 
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9558, pp. 329 - 342
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.