Results 311 to 320 of about 1,839,896 (336)

Novel countermeasures and techniques for differential power analysis. [PDF]

open access: possible, 2009
Research in the last few years has indicated that, despite modern algorithms being secure against all published mathematical attacks and being far too complex to break by brute force, secret key data can be gathered by monitoring the power consumption.
openaire   +1 more source

Solving Power System Differential Algebraic Equations Using Differential Transformation

IEEE Transactions on Power Systems, 2020
Yang Liu, Kai Sun
exaly  

Hardware level countermeasures against differential power analysis. [PDF]

open access: possible, 2012
Hardware implementations of mathematically secure algorithms unintentionally leak side channel information, that can be used to attack the device. Such attacks, known as side channel attacks, are becoming an increasingly important aspect of designing security systems.
openaire   +1 more source

Quasi-oppositional differential evolution for optimal reactive power dispatch

International Journal of Electrical Power and Energy Systems, 2016
Mousumi Basu
exaly  

A Systematic Method to Model Power Systems as Stochastic Differential Algebraic Equations

IEEE Transactions on Power Systems, 2013
Federico Milano, Rafael Zarate-Minano
exaly  

Differential Power Processing for DC Systems

IEEE Transactions on Power Electronics, 2013
Pradeep S Shenoy, Philip T Krein
exaly  

Single and Multi-objective Optimal Power Flow Using Grey Wolf Optimizer and Differential Evolution Algorithms

Electric Power Components and Systems, 2015
Attia A El-Fergany, Hany M Hasanien
exaly  

Differential properties of power functions

International Journal of Information and Coding Theory, 2010
Celine Blondeau   +2 more
exaly  

Home - About - Disclaimer - Privacy