搜索结果: 1-15 共查到“知识库 side”相关记录479条 . 查询时间(0.09 秒)
Design and control of a novel side-stream extractive distillation column for separating methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation column intermediate boiling entrainer Dynamic control Binary azeotrope Methanol-toluene
2023/6/19
It is innovative and important to perform complex binary azeotrope separation via single distillation column. In the article, design and control of a novel and simple side-stream extractive distillati...
Design and comparison of conventional and side-stream extractive distillation sequences for separating the methanol-toluene binary azeotrope with intermediate boiling entrainer
Side-stream extractive distillation Separation sequences Intermediate boiling entrainer Eco-efficiency analysis Methanol-toluene
2023/6/19
The side-stream extractive distillation (SSED) system is attracting widespread attention due to its high eco-efficiency. In the article, three double-column SSED (DC-SSED) sequences and two single-col...
A highly proton-conductive and vanadium-rejected long-side-chain sulfonated polybenzimidazole membrane for redox flow battery
Sulfonated long side chain Polybenzimidazole Vanadium redox flow battery 1 3-Propanesultone
2023/6/19
A long-side-chain sulfonated polybenzimidazole (PBI-PS) membrane was successfully prepared by the reaction of PBI with 1, 3-propanesultone for improving the efficiencies of vanadium redox flow battery...
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations
Side-Channel Attacks Security Evaluations Certification
2019/9/16
We take advantage of a recently published open source implementation of the AES protected with a mix of countermeasures against side-channel attacks to discuss both the challenges in protecting COTS d...
Deep Learning Model Generalization in Side-Channel Analysis
Side-Channel Analysis Deep Learning Model Generalization
2019/8/30
The adoption of deep neural networks for profiled side-channel attacks provides different capabilities for leakage detection of secure products. Research papers provide a variety of arguments with res...
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Machine learning and side channel analysis in a CTF competition
key recovery deep learning machine learning
2019/7/25
Machine learning is nowadays supplanting or extending human expertise in many domains ranging from board games to text translation. Correspondingly, the use of such tools is also on the rise in comput...
Stronger and Faster Side-Channel Protections for CSIDH
CSIDH Isogeny-based post-quantum cryptography key exchange
2019/7/22
CSIDH is a recent quantum-resistant primitive based on the difficulty of finding isogeny paths between supersingular curves. Recently, two constant-time versions of CSIDH have been proposed: first by ...
Optimal Collision Side-Channel Attacks
Side-channel analysis side-channel security evaluation collision attacks
2019/7/18
Collision side-channel attacks are efficient attacks against cryptographic implementations, however, optimal collision side-channel attacks and how to compute them efficiently is an open question. In ...
Optimal Collision Side-Channel Attacks
Side-channel analysis side-channel security evaluation collision attacks
2019/7/18
Collision side-channel attacks are efficient attacks against cryptographic implementations, however, optimal collision side-channel attacks and how to compute them efficiently is an open question. In ...
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures
Bitslicing Side-channel attacks Fault attacks
2019/7/8
We describe SKIVA, a customized 32-bit processor enabling the design of software countermeasures for a broad range of implementation attacks covering fault injection and side-channel analysis of timin...
SPQCop: Side-channel protected Post-Quantum Cryptoprocessor
cryptography post-quantum key-exchange cryptoprocessor
2019/7/8
The past few decades have seen significant progress in practically realizable quantum technologies. It is well known since the work of Peter Shor that large scale quantum computers will threaten the s...
Neural Network Model Assessment for Side-Channel Analysis
Side-Channel Analysis Neural Networks Model Assessment
2019/6/19
Leakage assessment of cryptographic implementations with side-channel analysis relies on two important assumptions: leakage model and the number of side-channel traces. In the context of profiled side...
The Art of Guessing in Combined Side-Channel Collision Attacks
MDCCF distinguisher voting collision voting
2019/6/13
Recent combined collision attacks have shown promising results for exploiting side-channel leakage information from both divide-and-conquer and analytical distinguishers. However, divide-and-conquer d...