Results 1 to 10 of about 597,284 (190)
On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings
White-box cryptography aims at protecting implementations of cryptographic algorithms against a very powerful attacker who controls the execution environment. The first defensive brick traditionally embedded in such implementations consists of encodings,
Laurent Castelnovi, Agathe Houzelot
doaj +2 more sources
Stochastic Partial Differential Equations: Analysis and Computations [PDF]
As the name suggests, Stochastic Partial Differential Equations is an interdisciplinary area at the crossroads of stochastic processes and partial differential equations (SPDEs). The beginnings of SPDEs as a new discipline can be traced to the late sixties and early seventies of the previous century.
Arnaud Debussche, Boris Rozovsky
openaire +3 more sources
Evolutionary computation techniques have always provided fascinating results in all the fields of science and engineering. However in the area of computer security, their contribution has been comparatively very less. More specifically if we consider the
Hridoy Jyoti Mahanta +4 more
doaj +1 more source
Homogeneous Mapping Model of ECC for Preventing Differential Power Analysis [PDF]
Existing public key research is based on increasing the redundance operation of Elliptic Curve Cryptosystems(ECC) aginst Differential Power Analysis(DPA) attacks,it causes ECC efficiency low,and affects the application of ECC in computation resource ...
WU Keke,LI Huiyun,YAN Lijun
doaj +1 more source
CUDA Based Enhanced Differential Evolution: A Computational Analysis [PDF]
General purpose graphic programming unit (GPGPU) programming is a novel approach for solving parallel variable independent problems. The graphic processor core (GPU) gives the possibility to use multiple blocks, each of which contains hundreds of threads.
Davendra, Donald David +3 more
openaire +2 more sources
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things
Unmanned aerial vehicle (UAV) plays a more and more important role in Internet of Things (IoT) for remote sensing and device interconnecting. Due to the limitation of computing capacity and energy, the UAV cannot handle complex tasks.
Dawei Wei, Ning Xi, Jianfeng Ma, Lei He
doaj +1 more source
Characterizing Computable Analysis with Differential Equations
AbstractThe functions of Computable Analysis are defined by enhancing the capacities of normal Turing Machines to deal with real number inputs. We consider characterizations of these functions using function algebras, known as Real Recursive Functions. Bournez and Hainry 2006 [Bournez, O. and E.
Manuel Lameiras Campagnolo +1 more
openaire +3 more sources
Research on Differential Privacy Protection for Collaborative Vehicle-Road Inference [PDF]
Collaborative vehicle-road inference performs deep convolutional network inference operations by combining vehicular terminals and roadside edge servers.Although this process improves inference efficiency, it creates the issue of user privacy leaks ...
WU Maoqiang, HUANG Xumin, KANG Jiawen, YU Rong
doaj +1 more source
EEG data analysis with stacked differentiable neural computers [PDF]
Differentiable neural computer (DNC) has demonstrated remarkable capabilities in solving complex problems. In this paper, we propose to stack an enhanced version of differentiable neural computer together to extend its learning capabilities. Firstly, we give an intuitive interpretation of DNC to explain the architectural essence and demonstrate the ...
Yurui Ming +6 more
openaire +1 more source
Characteristic Mode Analysis applied to antennas [PDF]
This paper introduces the Characteristic Mode Analysis in the computation of electromagnetic resonant modes in conducting bodies. Canonical cases (thin wire and a rectangular plate) are analyzed, along with real-world complex structures, a mobile phone ...
Marcelo B. Perotoni +2 more
doaj +1 more source

