Machine/Deep Learning.- Machine-Learning assisted Side-Channel Attacks on RNS ECC Implementations using Hybrid Feature Engineering.- Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis.- On the Evaluation of Deep Learning-based Side-channel Analysis.- Tools & References A Second Look at the ASCAD Databases.- FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication.- Body Biasing Injection: To thin or not to thin the substrate?.- Attacks On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks.- Single-trace clustering power analysis of the point-swapping procedure in the three point ladder of Cortex-M4 SIKE.- Canonical DPA attack on HMAC-SHA1/SHA2.- Masking Provable Secure Software Masking in the Real-World.- Systematic Study of Decryption and Re-Encryption Leakage: the Case of Kyber.- Handcrafting: Improving Automated Masking in Hardware with Manual Optimizations.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: