TY - GEN AU - Hong,Seokhie TI - Side Channel Attacks SN - books978-3-03921-001-5 PY - 2019/// PB - MDPI - Multidisciplinary Digital Publishing Institute KW - n/a KW - binary Huff curve KW - FPGA KW - post quantum cryptography KW - data loss KW - side-channel cache attacks KW - rsa cryptosystem KW - first-order analysis KW - chaotic circuit KW - integrity KW - ad libraries KW - power-analysis attack KW - single trace analysis KW - side-channel authentication KW - provable security KW - ad lib KW - cache misses KW - cache side-channel attack KW - leakage model KW - NTRU KW - graph KW - AES KW - hardware security KW - recovery of secret exponent by triangular trace analysis KW - side-channel attacks KW - information leakage KW - data outsourcing KW - CPLD KW - scatter-gather implementation KW - modular exponentiation KW - lattice-based cryptography KW - elliptic curve cryptography KW - Gaussian sampling KW - post-quantum cryptography KW - reliability KW - unified point addition KW - ad networks KW - graph similarity KW - mobile ads KW - physically unclonable function KW - tweakable block cipher KW - Merkle (hash) tree KW - machine-learning classification KW - side channel attack KW - online authentication KW - side channel analysis KW - financial IC card KW - side-channel attack KW - re-keying KW - cloud computing KW - cryptographic keys KW - chaos theory KW - horizontal collision correlation analysis KW - countermeasure KW - embedded system security KW - cache attack KW - single-trace attack KW - software development kit (SDK) KW - CDT sampling KW - key bit-dependent attack KW - side-channel analysis KW - second-order analysis KW - constant-time cryptographic algorithm KW - android package (APK) KW - challenge-response authentication N1 - Open Access N2 - This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on UR - https://mdpi.com/books/pdfview/book/1339 UR - https://directory.doabooks.org/handle/20.500.12854/59342 ER -