Results 11 to 20 of about 367,522 (306)

DL-LA: Deep Learning Leakage Assessment

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequently executed tasks.
Thorben Moos, Felix Wegener, Amir Moradi
doaj   +1 more source

Statutory interpretation: New comparative dimensions [PDF]

open access: yes, 2005
Horst Klaus ...
Bennion   +10 more
core   +2 more sources

A Rare Case of Isolated Cerebral Sarcoidosis Presenting as Suprasellar Mass Lesion with Salt-Wasting Hypopituitarism

open access: yesJournal of Neurological Surgery Reports, 2015
Background Sarcoidosis is a systemic disorder of unknown origin characterized by noncaseating granulomas. Clinical symptoms due to central nervous system (CNS) involvement occur in 5 to 7% of all cases; subclinical involvement is more frequent.
H. Krenzlin   +5 more
doaj   +1 more source

Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal

open access: yesApplied Sciences, 2021
The imbalance of the currents leaked by CMOS standard cells when different logic values are applied to their inputs can be exploited as a side channel to recover the secrets of cryptographic implementations.
Bijan Fadaeinia   +2 more
doaj   +1 more source

Superconducting electronics [PDF]

open access: yes, 1994
During the last decades superconducting electronics has been the most prominent area of research for small scale applications of superconductivity. It has experienced quite a stormy development, from individual low frequency devices to devices with high ...
Rogalla, Horst
core   +3 more sources

Radioimmunoscintigraphy Using Monoclonal Antibodies to CEA, CA 19-9 and CA 125

open access: yesThe International Journal of Biological Markers, 1988
131 I labelled F (ab’) 2 fragments of monoclonal antibodies against CA 19-9 and CEA (“radioimmunococktail” IMACIS 1) were used in a prospective study (n = 60 patients) and in a retrospective study (n = 32 patients) for the detection of colorectal ...
R.P. Baum   +8 more
doaj   +1 more source

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle   +3 more
doaj   +1 more source

The SPEEDY Family of Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We introduce SPEEDY, a family of ultra low-latency block ciphers. We mix engineering expertise into each step of the cipher’s design process in order to create a secure encryption primitive with an extremely low latency in CMOS hardware.
Gregor Leander   +3 more
doaj   +1 more source

Stable TeV - black hole remnants at the LHC : discovery through di-jet suppression, mono-jet emission and a supersonic boom in the quark-gluon plasma [PDF]

open access: yes, 2006
The production of Large Extra Dimension (LXD) Black Holes (BHs), with a new, fundamental mass scale of M_f = 1 TeV, has been predicted to occur at the Large Hadron Collider, LHC, with the formidable rate of 10^8 per year in p-p collisions at full energy,
Stöcker, Horst
core   +2 more sources

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.
Thorsten Kranz   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy