- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0003000000000000
- More
- Availability
-
12
- Author / Contributor
- Filter by Author / Creator
-
-
Clark, Tristan (3)
-
Johnson, Dylan (2)
-
Andel, Todd R. (1)
-
Arnett, Kylie (1)
-
Baggett, Brandon (1)
-
Kivilcim, Berk (1)
-
Kline, Bradford (1)
-
McDonald, Jeffrey (1)
-
McDonald, Jeffrey T (1)
-
McDonald, Jeffrey T. (1)
-
Mullens, Tristen (1)
-
Mullins, Tristen (1)
-
Neal, Zachary (1)
-
Styles, Ryan (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available March 22, 2026
-
Clark, Tristan; Johnson, Dylan; Neal, Zachary; Kivilcim, Berk; Arnett, Kylie; Mullins, Tristen; Styles, Ryan; McDonald, Jeffrey T (, IEEE)Free, publicly-accessible full text available March 22, 2026
-
Clark, Tristan; McDonald, Jeffrey T.; Andel, Todd R.; Baggett, Brandon; Mullens, Tristen (, Proceedings of IEEE Southeastcon)After the discovery of data leakage from cryptographic algorithm implementations, there has been a need to counter or hide the data that allow adversaries to capture the cryptographic key. To explore side-channel attack methods or countermeasures, it is important for researchers to understand what side-channels are and how they are produced. There have been numerous surveys in which the side-channel attacks and countermeasures are surveyed, but little to no research about the side-channels themselves. This paper addresses this gap in the existing literature by developing a taxonomy for side-channels, classified by the manner in which they are produced. Following the proposed model, some of the common side-channel analysis attack methods are discussed and we show where the side-channel would fit in the proposed model.more » « less
An official website of the United States government
