Results 31 to 40 of about 336,920 (287)

Pattern matching of signature-based IDS using Myers algorithm under MapReduce framework

open access: yesEURASIP Journal on Information Security, 2017
The rapid increase in wired Internet speed and the constant growth in the number of attacks make network protection a challenge. Intrusion detection systems (IDSs) play a crucial role in discovering suspicious activities and also in preventing their ...
Monther Aldwairi   +2 more
doaj   +1 more source

Fixslicing AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations.
Alexandre Adomnicai, Thomas Peyrin
doaj   +3 more sources

Electronic Unit for the Management of Energy Harvesting of Different Piezo Generators

open access: yesCrystals, 2021
The constant advance in the development of piezoelectric materials for energy harvesting has demanded new implementations in the electronics field. The piezoelectric property of these materials has been considered an energy source for low-power devices ...
Sergio Rincón-Murcia   +3 more
doaj   +1 more source

Power Analysis on NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
This paper applies a variety of power analysis techniques to several implementations of NTRU Prime, a Round 2 submission to the NIST PQC Standardization Project.
Wei-Lun Huang   +2 more
doaj   +1 more source

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We present implementations of the lattice-based digital signature scheme Dilithium for ARM Cortex-M3 and ARM Cortex-M4. Dilithium is one of the three signature finalists of the NIST post-quantum cryptography competition.
Denisa O. C. Greconici   +2 more
doaj   +3 more sources

Dynamic Optimization and Production Planning of Thermal Cracking Operation [PDF]

open access: yesModeling, Identification and Control, 2003
This work addresses the dynamic optimization of the production period of thermal crackers with respect to coke formation in the cracking coil and transfer line exchanger.
Emil H. Edwin, Jens G. Balchen
doaj   +1 more source

Stochastic Representations of Ion Channel Kinetics and Exact Stochastic Simulation of Neuronal Dynamics [PDF]

open access: yes, 2014
In this paper we provide two representations for stochastic ion channel kinetics, and compare the performance of exact simulation with a commonly used numerical approximation strategy.
Anderson, David F.   +2 more
core   +3 more sources

A Compact and Scalable Hardware/Software Co-design of SIKE

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We present efficient and compact hardware/software co-design implementations of the Supersingular Isogeny Key Encapsulation (SIKE) protocol on field-programmable gate arrays (FPGAs).
Pedro Maat C. Massolino   +3 more
doaj   +1 more source

A framework for invertible, real-time constant-Q transforms

open access: yes, 2012
Audio signal processing frequently requires time-frequency representations and in many applications, a non-linear spacing of frequency-bands is preferable.
Dörfler, Monika   +3 more
core   +1 more source

Event Stream-Based Process Discovery using Abstract Representations [PDF]

open access: yes, 2017
The aim of process discovery, originating from the area of process mining, is to discover a process model based on business process execution data. A majority of process discovery techniques relies on an event log as an input.
van der Aalst, Wil M. P.   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy