Cryptographic algorithms are widely used in daily life in order to ensure data confidentiality and privacy. These algorithms are extensively analyzed by scientists against a theoretical deficiency. However, these theoretically verified algorithms could still posses security risks if they are not cautiously implemented. Side-channel analysis can infer the secret key by using the information leakage due to implementation flaws. One of the most studied side-channel attack is the Bernstein’s cache-timing attack. This attack owes its reputation to its ability to succeed without a spy process, which is needed to create intentional cache contentions in other cache attacks. However, the exact leakage sources of the Bernstein’s attack remained uncer...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
Tato bakalářská práce využívá informační metriky známé jako odhadová entropie za účelem analýzy info...
Thesis (M.A.)--Özyeğin University, Graduate School of Sciences and Engineering, Department of Comput...
Cache-based side-channel attacks are increasingly exposing the weaknesses of many cryptographic libr...
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
Architectural enhancements are a set of modifications in a general-purpose processor to improve the ...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
Külgkanali informatsioon on igat tüüpi info, mis lekib andmeid töötleva süsteemi füüsiliste eripärad...
In this dissertation we study some of the problems arising on computer systems that leak information...
This paper attempts to strengthen the pursued research on social engineering (SE) threat identificat...
This habilitation thesis presents advancements in machine learning for computer security, arising f...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
Tato bakalářská práce využívá informační metriky známé jako odhadová entropie za účelem analýzy info...
Thesis (M.A.)--Özyeğin University, Graduate School of Sciences and Engineering, Department of Comput...
Cache-based side-channel attacks are increasingly exposing the weaknesses of many cryptographic libr...
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
Architectural enhancements are a set of modifications in a general-purpose processor to improve the ...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
Cryptography studies how to secure communications and information. The security of a cryptosystem de...
Külgkanali informatsioon on igat tüüpi info, mis lekib andmeid töötleva süsteemi füüsiliste eripärad...
In this dissertation we study some of the problems arising on computer systems that leak information...
This paper attempts to strengthen the pursued research on social engineering (SE) threat identificat...
This habilitation thesis presents advancements in machine learning for computer security, arising f...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
Tato bakalářská práce využívá informační metriky známé jako odhadová entropie za účelem analýzy info...
Thesis (M.A.)--Özyeğin University, Graduate School of Sciences and Engineering, Department of Comput...