Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
Securing the AES Finalists Against Power Analysis Attacks
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
Pocket school monitoring and tracking student performance on mobile devices
WBE'06 Proceedings of the 5th IASTED international conference on Web-based education
Investigations of power analysis attacks on smartcards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
IEICE - Transactions on Information and Systems
Information leakage via electromagnetic emanations and evaluation of tempest countermeasures
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Compromising electromagnetic emanations of wired and wireless keyboards
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
A general power model of differential power analysis attacks to static logic circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Acoustic side-channel attacks on printers
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
FinFET-Based Power Management for Improved DPA Resistance with Low Overhead
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Heat of the moment: characterizing the efficacy of thermal camera-based attacks
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Characterization of the electromagnetic side channel in frequency domain
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
iSpy: automatic reconstruction of typed input from compromising reflections
Proceedings of the 18th ACM conference on Computer and communications security
Televisions, video privacy, and powerline electromagnetic interference
Proceedings of the 18th ACM conference on Computer and communications security
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers
Proceedings of the 18th ACM conference on Computer and communications security
A wireless covert channel on smart cards (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Electromagnetic eavesdropping risks of flat-panel displays
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Evaluation and improvement of the tempest fonts
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Security limits for compromising emanations
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Private circuits II: keeping secrets in tamperable circuits
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Penetrating encrypted evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Potentia est scientia: security and privacy implications of energy-proportional computing
HotSec'12 Proceedings of the 7th USENIX conference on Hot Topics in Security
Role of power grid in side channel attack and power-grid-aware secure design
Proceedings of the 50th Annual Design Automation Conference
Seeing double: reconstructing obscured typed input from repeated compromising reflections
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |