Results 11 to 20 of about 367,522 (306)
DL-LA: Deep Learning Leakage Assessment
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequently executed tasks.
Thorben Moos, Felix Wegener, Amir Moradi
doaj +1 more source
Statutory interpretation: New comparative dimensions [PDF]
Horst Klaus ...
Bennion +10 more
core +2 more sources
Background Sarcoidosis is a systemic disorder of unknown origin characterized by noncaseating granulomas. Clinical symptoms due to central nervous system (CNS) involvement occur in 5 to 7% of all cases; subclinical involvement is more frequent.
H. Krenzlin +5 more
doaj +1 more source
Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations.
Bijan Fadaeinia +2 more
doaj +1 more source
Superconducting electronics [PDF]
During the last decades superconducting electronics has been the most prominent area of research for small scale applications of superconductivity. It has experienced quite a stormy development, from individual low frequency devices to devices with high ...
Rogalla, Horst
core +3 more sources
Radioimmunoscintigraphy Using Monoclonal Antibodies to CEA, CA 19-9 and CA 125
131 I labelled F (ab’) 2 fragments of monoclonal antibodies against CA 19-9 and CEA (“radioimmunococktail” IMACIS 1) were used in a prospective study (n = 60 patients) and in a retrospective study (n = 32 patients) for the detection of colorectal ...
R.P. Baum +8 more
doaj +1 more source
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle +3 more
doaj +1 more source
The SPEEDY Family of Block Ciphers
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
Gregor Leander +3 more
doaj +1 more source
Stable TeV - black hole remnants at the LHC : discovery through di-jet suppression, mono-jet emission and a supersonic boom in the quark-gluon plasma [PDF]
The production of Large Extra Dimension (LXD) Black Holes (BHs), with a new, fundamental mass scale of M_f = 1 TeV, has been predicted to occur at the Large Hadron Collider, LHC, with the formidable rate of 10^8 per year in p-p collisions at full energy,
Stöcker, Horst
core +2 more sources
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz +2 more
doaj +1 more source

