Results 91 to 100 of about 462,135 (294)
Статистичні моделі двомісних логічних операцій для проведення інженерно-криптографічних атак за побічними каналами витоку інформації [PDF]
Запропоновано статистичні моделі, досліджено їх властивості та запропоновано методику проведення інженерно-криптографічних атак за побічними каналами витоку інформації на комп'ютерні реалізації логічних операцій двох змінних.For realization of logical ...
Карпінський, Микола +1 more
core
A polymorphic reconfigurable multi‐electrode device based on electrically bistable nanostructured metallic films. The adaptive reconfiguration properties of the nanostructured network under specific input voltages drive the reprogrammability of the device. This system can be employed for the implementation of polymorphic devices, which can be used both
Silvia Bressan +4 more
wiley +1 more source
We estimate the number of physical qubits and execution time by decomposing an implementation of Shor’s algorithm for elliptic curve discrete logarithms into universal gate units at the logical level when surface codes are used.
Jinyoung Ha, Jonghyun Lee, Jun Heo
doaj +1 more source
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the most vulnerable attack path in a known attack graph, where an attack path
Eugene Levner, Dmitry Tsadikovich
doaj +1 more source
Efficient quantum key distribution over a collective noise channel
We present two efficient quantum key distribution schemes over two different collective-noise channels. The accepted hypothesis of collective noise is that photons travel inside a time window small compared to the variation of noise.
C. H. Bennett +4 more
core +1 more source
HAMLOCK: HArdware-Model LOgically Combined attacK
The growing use of third-party hardware accelerators (e.g., FPGAs, ASICs) for deep neural networks (DNNs) introduces new security vulnerabilities. Conventional model-level backdoor attacks, which only poison a model's weights to misclassify inputs with a specific trigger, are often detectable because the entire attack logic is embedded within the model
Amgain, Sanskar +4 more
openaire +2 more sources
A concealable physical unclonable function (PUF) based on an array of 384 nanoscale voltage‐controlled magnetic tunnel junctions is demonstrated. The PUF operates without any external magnetic field. It uses a combination of deterministic and stochastic switching mechanisms, based on the spin transfer torque and voltage‐controlled magnetic anisotropy ...
Thomas Neuner +6 more
wiley +1 more source
This paper aims to show the major role means of protection play for strengthening the cybersecurity of critical transport infrastructure by using the advanced method of simulation modelling.
Ivanova Yoana
doaj +1 more source
Hydrocarbon membranes have the potential to significantly enhance the efficiency of water electrolyzers. However, their application is often limited by insufficient stability resulting from excessive swelling. This work presents a strategy to achieve efficient, safe and stable operation of a 24 µm thin hydrocarbon membrane by combining a modified ...
Clara Schare +8 more
wiley +1 more source
CRITIQUES OF NEOCLASSICAL ECONOMICS: AN EXAMINATION OF SOME OF THE CRITIQUES OF STEVE KEEN
Neoclassical economics (NE) is under siege from multiple directions. Some see NE as a whole and essentially coherent theoretical system and paradigm and some not.
James M. Craven
doaj +1 more source

