Side-Channel Attacks on Masked Bitsliced Implementations of AES
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj +1 more source
Combining simultaneous with temporal masking [PDF]
Simultaneous and temporal masking are two frequently used techniques in psychology and vision science. Although there are many studies and theories related to each masking technique, there are no systematic investigations of their mutual relationship ...
Francis, Gregory +2 more
core +1 more source
Perception of Water-Based Masking Sounds—Long-Term Experiment in an Open-Plan Office
A certain level of masking sound is necessary to control the disturbance caused by speech sounds in open-plan offices. The sound is usually provided with evenly distributed loudspeakers.
Valtteri Hongisto +7 more
doaj +1 more source
Pixelating Familiar People in the Media: Should Masking Be Taken at Face Value? [PDF]
This study questions the effectiveness of masking faces by means of pixelation on television or in newspapers. Previous studies have shown that masking just the face leads to unacceptably high recognition levels, making it likely that participants also ...
Demanet, Jelle +4 more
core +2 more sources
Higher order color mechanisms : Evidence from noise-masking experiments in cone contrast space [PDF]
This study addresses a fundamental question concerning the number of cortical, i.e., higher order mechanisms in color vision. The initial subcortical stages in color vision can be described by three cone mechanisms, S, M, L, and three pairs of second ...
Gegenfurtner, Karl R., Hansen, Thorsten
core +2 more sources
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking
In this work, we perform an extensive investigation and construct a portfolio of S-boxes suitable for secure lightweight implementations, which aligns well with the ongoing NIST Lightweight Cryptography competition.
Begül Bilgin +4 more
doaj +1 more source
JND-Based Perceptual Video Coding for 4:4:4 Screen Content Data in HEVC [PDF]
The JCT-VC standardized Screen Content Coding (SCC) extension in the HEVC HM RExt + SCM reference codec offers an impressive coding efficiency performance when compared with HM RExt alone; however, it is not significantly perceptually optimized.
Prangnell, Lee, Sanchez, Victor
core +2 more sources
Development of Auditory Selective Attention: Why Children Struggle to Hear in Noisy Environments [PDF]
Children’s hearing deteriorates markedly in the presence of unpredictable noise. To explore why, 187 school-age children (4–11 years) and 15 adults performed a tone-in-noise detection task, in which the masking noise varied randomly between every ...
Amitay, S., Jones, P. R., Moore, D.
core +1 more source
Saccadic Suppression of Displacement Does Not Reflect a Saccade-Specific Bias to Assume Stability
Across saccades, small displacements of a visual target are harder to detect and their directions more difficult to discriminate than during steady fixation.
Sabine Born
doaj +1 more source
Self-heated thermocouples for far-infrared detection [PDF]
A novel self-heated Bi-Sb thermocouple for far-infrared detection has been developed. The detector is suitable for integration with monolithic antennas and imaging arrays.
Neikirk, Dean P., Rutledge, David B.
core +1 more source

