Results 21 to 30 of about 367,522 (306)
Transitional Leakage in Theory and Practice
Accelerated by the increased interconnection of highly accessible devices, the demand for effective and efficient protection of hardware designs against Side-Channel Analysis (SCA) is ever rising, causing its topical relevance to remain immense in both,
Nicolai Müller +3 more
doaj +1 more source
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice.
Florian Stolz +9 more
doaj +1 more source
Standard Lattice-Based Key Encapsulation on Embedded Devices
Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016, Bos et al.
James Howe +3 more
doaj +1 more source
Re-Consolidating First-Order Masking Schemes
Application of masking, known as the most robust and reliable countermeasure to side-channel analysis attacks, on various cryptographic algorithms has dedicated a lion’s share of research to itself.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj +3 more sources
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
The developments in the areas of strong Physical Unclonable Functions (PUFs) predicate an ongoing struggle between designers and attackers. Such a combat motivated the atmosphere of open research, hence enhancing PUF designs in the presence of Machine ...
Anita Aghaie, Amir Moradi
doaj +1 more source
Modified Hash to Obtain Random Subset-Tree (MHORST) Using Merkle Tree and Mersenne Twister
The development of quantum computing triggers new challenges in data security, particularly in addressing attacks that can solve complex mathematical problems on the fly.
Faidhil Nugrah Ramadhan Ahmad +1 more
doaj +1 more source
Background Limited data exist collating most of the associated factors for strabismus in one analysis. The aim of this study was to assess the prevalence of strabismus and to analyse associated factors in former preterm and full-term infants.
Achim Fieß +6 more
doaj +1 more source
Shorter Linear Straight-Line Programs for MDS Matrices
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Most previous work concentrated on locally optimizing the multiplication with single matrix elements.
Thorsten Kranz +3 more
doaj +1 more source
Decision Framework for Predictive Maintenance Method Selection
Many asset owners and maintainers have the ambition to better predict the future state of their equipment to make timely and better-informed maintenance decisions.
Wieger Tiddens +2 more
doaj +1 more source
Countermeasures against Static Power Attacks
In recent years it has been demonstrated convincingly that the standby power of a CMOS chip reveals information about the internally stored and processed data.
Thorben Moos, Amir Moradi
doaj +1 more source

