Results 261 to 270 of about 336,920 (287)
Some of the next articles are maybe not open access.

Implementations in Machine Ethics

ACM Computing Surveys, 2021
Suzanne Tolmeijer, Markus Kneer
exaly  

A complete and constant time wait-free implementation of CAS from LL/SC and vice versa

1998
We consider three popular types of shared memory that support one of the following sets of operations: {CAS, read, write}, {LL, SC, VL, read, write}, or {RLL, RSC, read, write}. We present algorithms that, together with Moir's [Moi97], efficiently implement each shared memory above from any of the other two.
openaire   +1 more source

sj-docx-1-bhd-10.1177_01987429241231793 – Supplemental material for Paraprofessionals’ Implementation of Constant Time Delay Procedures With Elementary Students With High-Intensity Behavioral Support Needs

Supplemental material, sj-docx-1-bhd-10.1177_01987429241231793 for Paraprofessionals’ Implementation of Constant Time Delay Procedures With Elementary Students With High-Intensity Behavioral Support Needs by Allison M. Kroesch, Sarah Southall, Nancy Welsh-Young and Katherine N.
Kroesch, Allison M.   +3 more
openaire   +1 more source

LOCS: LOw-Latency and ConStant-Timing Implementation of Fixed-Weight Sampler for HQC

2023 IEEE International Symposium on Circuits and Systems (ISCAS), 2023
Pengzhou He, Yazheng Tu, Jiafeng Xie
openaire   +1 more source

Evaluating the Security Boundaries of Constant-Time Implementations Against Timing Side-Channel Attacks

In this paper, timing side-channel attack (TSCA) and the weaknesses of the constant-time (CT) programming as a protection mechanism are reviewed based on the literature. It follows the development of timing attacks over the years, starting with primitive algorithmic leakages (RSA, Diffie-Hellman) to cache-based attacks on AES, to microarchitectural ...
openaire   +1 more source

An Optimised Constant-Time Implementation of KASUMI FI Function

2024 35th Irish Signals and Systems Conference (ISSC)
Emma Urquhart, Desmond Chambers
openaire   +1 more source

Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks

2023 12th Mediterranean Conference on Embedded Computing (MECO), 2023
Alkistis Aikaterini Sigourou   +4 more
openaire   +1 more source

Sustainable energy performances of green buildings: A review of current theories, implementations and challenges

Renewable and Sustainable Energy Reviews, 2013
Amirhosein Ghaffarianhoseini   +2 more
exaly  

Home - About - Disclaimer - Privacy