Results 31 to 40 of about 367,522 (306)

Horst Fuhrmann

open access: hybridDeutsches Archiv für Erforschung des Mittelalters, 2012
Wilfried Hartmann
openaire   +2 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Sex differences in medication discontinuation in axial spondyloarthritis.

open access: yesArthritis Care &Research, Accepted Article.
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or Janus kinase inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we ...
Rachael Stovall   +9 more
wiley   +1 more source

Second-Order SCA Security with almost no Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking schemes are among the most popular countermeasures against Side-Channel Analysis (SCA) attacks. Realization of masked implementations on hardware faces several difficulties including dealing with glitches.
Aein Rezaei Shahmirzadi, Amir Moradi
doaj   +1 more source

Four‐Point Bending Tests at High Temperatures on Commercial MgO‐C Refractory Bricks with and Without Recyclate Considering Different Carbon Contents

open access: yesAdvanced Engineering Materials, EarlyView.
Four‐point bending tests are conducted in an argon atmosphere on commercial MgO‐C brick grades with and without MgO‐C recyclate from room temperature up to 1300 °C. No detrimental effect of the MgO‐C recyclates on bending strength is found. Instead, a decisive influence of the total carbon content is observed, with lower total carbon contents ...
Alexander Schramm   +5 more
wiley   +1 more source

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

ALEA III 23rd International Composition Competition, October 1, 2005 [PDF]

open access: yes, 2005
This is the concert program of the ALEA III performance on Saturday, October 1, 2005 at 7:00 p.m., at the Tsai Performance Center, 685 Commonwealth Avenue. Works performed were "Siray" by Jorge Villavicencio Grossmann, "Threads" by Martha Callison Horst,
School of Music, Boston University
core  

Direct Evidence of Topological Dirac Fermions in a Low Carrier Density Correlated 5d Oxide

open access: yesAdvanced Functional Materials, EarlyView.
The 5d oxide BiRe2O6 is discovered as a low‐carrier‐density topological semimetal hosting symmetry‐protected Dirac fermions stabilized by nonsymmorphic symmetries. Angle‐resolved photoemission spectroscopy, quantum oscillations, and magnetotransport measurements reveal gapless Dirac cones, quasi‐2D Fermi surfaces, high carrier mobility, and a field ...
Premakumar Yanda   +11 more
wiley   +1 more source

Combined Threshold Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Physical security is an important aspect of devices for which an adversary can manipulate the physical execution environment. Recently, more and more attention has been directed towards a security model that combines the capabilities of passive and ...
Jakob Feldtkeller   +3 more
doaj   +1 more source

Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?

open access: yesJournal of Mathematical Cryptology, 2020
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field 𝔽p2. Using the representation technique, we reduce ECDLP to a multivariate polynomial zero testing problem.
Delaplace Claire, May Alexander
doaj   +1 more source

Home - About - Disclaimer - Privacy