<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyberagentur</provider_name><provider_url>https://www.cyberagentur.de/en/</provider_url><author_name>ML</author_name><author_url>https://www.cyberagentur.de/en/author/ml/</author_url><title>Side-Channel Attacks with Quantum Sensing (SCA-QS) - Cyberagentur</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="sKV55jLQPo"&gt;&lt;a href="https://www.cyberagentur.de/en/programs/sca-qs/"&gt;Side-Channel Attacks with Quantum Sensing (SCA-QS)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberagentur.de/en/programs/sca-qs/embed/#?secret=sKV55jLQPo" width="600" height="338" title="&#x201C;Side-Channel Attacks with Quantum Sensing (SCA-QS)&#x201D; &#x2014; Cyberagentur" data-secret="sKV55jLQPo" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberagentur.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberagentur.de/wp-content/uploads/2024/08/SCA-QS_2.jpg</thumbnail_url><thumbnail_width>2304</thumbnail_width><thumbnail_height>1792</thumbnail_height><description>Background Side channel attacks (SCA) are attacks that aim to obtain hidden information, uncover properties of program routines or physically implement cryptographic systems. Information such as passwords, encryption keys or other sensitive data on electronic chips can be uncovered by analyzing physical characteristics of the system such as power consumption, electromagnetic emissions or the time [&hellip;]</description></oembed>
