Results 1 to 10 of about 597,284 (190)

On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
White-box cryptography aims at protecting implementations of cryptographic algorithms against a very powerful attacker who controls the execution environment. The first defensive brick traditionally embedded in such implementations consists of encodings,
Laurent Castelnovi, Agathe Houzelot
doaj   +2 more sources

Stochastic Partial Differential Equations: Analysis and Computations [PDF]

open access: yesStochastic Partial Differential Equations: Analysis and Computations, 2013
As the name suggests, Stochastic Partial Differential Equations is an interdisciplinary area at the crossroads of stochastic processes and partial differential equations (SPDEs). The beginnings of SPDEs as a new discipline can be traced to the late sixties and early seventies of the previous century.
Arnaud Debussche, Boris Rozovsky
openaire   +3 more sources

Using Genetic Algorithm in Inner Product to Resist Modular Exponentiation From Higher Order DPA Attacks

open access: yesIEEE Access, 2022
Evolutionary computation techniques have always provided fascinating results in all the fields of science and engineering. However in the area of computer security, their contribution has been comparatively very less. More specifically if we consider the
Hridoy Jyoti Mahanta   +4 more
doaj   +1 more source

Homogeneous Mapping Model of ECC for Preventing Differential Power Analysis [PDF]

open access: yesJisuanji gongcheng, 2017
Existing public key research is based on increasing the redundance operation of Elliptic Curve Cryptosystems(ECC) aginst Differential Power Analysis(DPA) attacks,it causes ECC efficiency low,and affects the application of ECC in computation resource ...
WU Keke,LI Huiyun,YAN Lijun
doaj   +1 more source

CUDA Based Enhanced Differential Evolution: A Computational Analysis [PDF]

open access: yesECMS 2012 Proceedings edited by: K. G. Troitzsch, M. Moehring, U. Lotzmann, 2012
General purpose graphic programming unit (GPGPU) programming is a novel approach for solving parallel variable independent problems. The graphic processor core (GPU) gives the possibility to use multiple blocks, each of which contains hundreds of threads.
Davendra, Donald David   +3 more
openaire   +2 more sources

UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things

open access: yesRemote Sensing, 2021
Unmanned aerial vehicle (UAV) plays a more and more important role in Internet of Things (IoT) for remote sensing and device interconnecting. Due to the limitation of computing capacity and energy, the UAV cannot handle complex tasks.
Dawei Wei, Ning Xi, Jianfeng Ma, Lei He
doaj   +1 more source

Characterizing Computable Analysis with Differential Equations

open access: yesElectronic Notes in Theoretical Computer Science, 2008
AbstractThe functions of Computable Analysis are defined by enhancing the capacities of normal Turing Machines to deal with real number inputs. We consider characterizations of these functions using function algebras, known as Real Recursive Functions. Bournez and Hainry 2006 [Bournez, O. and E.
Manuel Lameiras Campagnolo   +1 more
openaire   +3 more sources

Research on Differential Privacy Protection for Collaborative Vehicle-Road Inference [PDF]

open access: yesJisuanji gongcheng, 2022
Collaborative vehicle-road inference performs deep convolutional network inference operations by combining vehicular terminals and roadside edge servers.Although this process improves inference efficiency, it creates the issue of user privacy leaks ...
WU Maoqiang, HUANG Xumin, KANG Jiawen, YU Rong
doaj   +1 more source

EEG data analysis with stacked differentiable neural computers [PDF]

open access: yesNeural Computing and Applications, 2018
Differentiable neural computer (DNC) has demonstrated remarkable capabilities in solving complex problems. In this paper, we propose to stack an enhanced version of differentiable neural computer together to extend its learning capabilities. Firstly, we give an intuitive interpretation of DNC to explain the architectural essence and demonstrate the ...
Yurui Ming   +6 more
openaire   +1 more source

Characteristic Mode Analysis applied to antennas [PDF]

open access: yesRevista Brasileira de Ensino de Física, 2020
This paper introduces the Characteristic Mode Analysis in the computation of electromagnetic resonant modes in conducting bodies. Canonical cases (thin wire and a rectangular plate) are analyzed, along with real-world complex structures, a mobile phone ...
Marcelo B. Perotoni   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy