Essays about: "aes algorithm"
Showing result 11 - 15 of 30 essays containing the words aes algorithm.
-
11. Deep Learning Based Side-Channel Analysis of AES Based on Far Field Electromagnetic Radiation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Advanced Encryption Standard (AES) is a widely accepted encryption algorithm used in Internet-of-Things (IoT) devices such as Bluetooth devices. Although the implementation of AES is complicated enough, attackers can still acquire the cryptographic information generated from the AES execution to perform Side-Channel Attack (SCA). READ MORE
-
12. Internet of Things Security : Encryption Capacity Comparison for IoT Based on Arduino Devices.
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: IoT is a system of devices with unique identifiers (UIDs) and can transfer data over a network. They are widely used in various sectors such as Health, Commercial, Transport, etc. READ MORE
-
13. On the effectiveness of ß-VAEs for imageclassification and clustering : Using a disentangled representation for Transfer Learning and Semi-Supervised Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Data labeling is a critical and costly process, thus accessing large amounts of labeled data is not always feasible. Transfer Learning (TL) and Semi-Supervised Learning (SSL) are two promising approaches to leverage both labeled and unlabeled samples. READ MORE
-
14. Tiny Security : Evaluating energy use for security in an IoT application
University essay from Mittuniversitetet/Institutionen för data- och systemvetenskapAbstract : IoT devices are increasingly used in the process of gathering scientific data. In environmental monitoring IoT devices can be used as remote sensing devices to collect information about e.g. temperature. READ MORE
-
15. Deep-Learning Side-Channel Attacks on AES
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ett hot mot säkerheten för implementationer av kryp- tografiska algoritmer. Konceptuellt är tanken att övervaka ett chip medan det kör kryptering för informationsläckage av ett visst slag, t.ex. READ MORE