Results 31 to 40 of about 1,839,896 (336)
Spontaneous and stimulated Raman scattering in long low loss fibers [PDF]
This paper considers the problem of forward Raman scattering process in a single transverse mode fiber. Both pump wave depletion and spontaneous scattering are considered in the analysis.
AuYeung, John, Yariv, Amnon
core +1 more source
Power corrections to the differential Drell-Yan cross section [PDF]
We estimate the power corrections (infrared renormalon contributions) to the coefficient functions for the differential Drell-Yan cross-section $d^2\sigma/dQ^2dy$, where $Q^2$ is the mass squared and $y$ the rapidity of the produced lepton pair.
Dasgupta, Mrinal
core +2 more sources
Correlation Differential Power Analysis Attack to Midori64
9 pages, 6 ...
Behrooz Khadem +2 more
openaire +2 more sources
Design issues in CMOS differential LC oscillators [PDF]
An analysis of phase noise in differential cross-coupled inductance-capacitance (LC) oscillators is presented. The effect of tail current and tank power dissipation on the voltage amplitude is shown.
Hajimiri, Ali, Lee, Thomas H.
core +1 more source
Differential Power Analysis of a McEliece Cryptosystem [PDF]
This work presents the first differential power analysis of an implementation of the McEliece cryptosystem. Target of this side-channel attack is a state-of-the-art FPGA implementation of the efficient QC-MDPC McEliece decryption operation as presented at DATE 2014.
Cong Chen 0001 +3 more
openaire +2 more sources
Power waves formulation of oscillation conditions: avoidance of bifurcation modes in cross-coupled VCO architectures [PDF]
This paper discusses necessity of power-waves formulation to extend voltage-current oriented approaches based on linear concepts such as admittance/impedance operators and transfer-function representations.
Bajon, Damienne, Wane, Sidina
core +1 more source
Differential Power Analysis of Stream Ciphers [PDF]
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream ciphers. The few existing references mainly treat timing [8] and template attacks [10], or provide a theoretical analysis [6], [7] of weaknesses of stream cipher constructions.
Wieland Fischer +3 more
openaire +1 more source
An Integrated Validation Environment for Differential Power Analysis [PDF]
Integrated systems represent the most common solution for storage and transmission of confidential data. However, cryptographic devices can be subject to passive attacks that consist in retrieving secret data by observing physical properties of the device (e.g. execution time, power consumption, electromagnetic field). An attack based on power analysis
Di Natale, Giorgio +2 more
openaire +2 more sources
In this paper, we investigate the implementations of newly introduced nonlocal differential operators as convolution of power law, exponential decay law, and the generalized Mittag-Leffler law with fractal derivative in fluid dynamics.
Imran Siddique +4 more
doaj +1 more source
1/f noise from nonlinear stochastic differential equations
We consider a class of nonlinear stochastic differential equations, giving the power-law behavior of the power spectral density in any desirably wide range of frequency.
Kaulakys, B., Ruseckas, J.
core +1 more source

