<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.
financial IC card, scatter-gather implementation, second-order analysis, challenge-response authentication, first-order analysis, machine-learning classification, Gaussian sampling, side-channel authentication, modular exponentiation, cryptographic keys, software development kit (SDK), FPGA, power-analysis attack, CPLD, Merkle (hash) tree, AES, recovery of secret exponent by triangular trace analysis, online authentication, CDT sampling, cloud computing, side-channel attacks, lattice-based cryptography, graph, graph similarity, cache attack, rsa cryptosystem, elliptic curve cryptography, integrity, chaos theory, binary Huff curve, TA1-2040, leakage model, post quantum cryptography, data loss, ad lib, information leakage, mobile ads, android package (APK), side-channel cache attacks, unified point addition, side-channel analysis, cache side-channel attack, tweakable block cipher, re-keying, embedded system security, side-channel attack, horizontal collision correlation analysis, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBX History of engineering and technology, constant-time cryptographic algorithm, T1-995, data outsourcing, side channel analysis, single-trace attack, provable security, ad networks, side channel attack, single trace analysis, reliability, chaotic circuit, NTRU, cache misses, post-quantum cryptography, key bit-dependent attack, n/a, ad libraries, hardware security, physically unclonable function, countermeasure
financial IC card, scatter-gather implementation, second-order analysis, challenge-response authentication, first-order analysis, machine-learning classification, Gaussian sampling, side-channel authentication, modular exponentiation, cryptographic keys, software development kit (SDK), FPGA, power-analysis attack, CPLD, Merkle (hash) tree, AES, recovery of secret exponent by triangular trace analysis, online authentication, CDT sampling, cloud computing, side-channel attacks, lattice-based cryptography, graph, graph similarity, cache attack, rsa cryptosystem, elliptic curve cryptography, integrity, chaos theory, binary Huff curve, TA1-2040, leakage model, post quantum cryptography, data loss, ad lib, information leakage, mobile ads, android package (APK), side-channel cache attacks, unified point addition, side-channel analysis, cache side-channel attack, tweakable block cipher, re-keying, embedded system security, side-channel attack, horizontal collision correlation analysis, thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBX History of engineering and technology, constant-time cryptographic algorithm, T1-995, data outsourcing, side channel analysis, single-trace attack, provable security, ad networks, side channel attack, single trace analysis, reliability, chaotic circuit, NTRU, cache misses, post-quantum cryptography, key bit-dependent attack, n/a, ad libraries, hardware security, physically unclonable function, countermeasure
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |