Results 31 to 40 of about 1,857,403 (288)
Joint Source-Channel Coding on a Multiple Access Channel with Side Information
We consider the problem of transmission of several distributed correlated sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separation does not hold for this channel.
Rajesh, R. +2 more
core +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Аналітичний огляд та аналіз трендів вразливості RowHummer для різних виробників DRAM
Мета роботи: провести аналітичний огляд вразливості жорстких дисків типу SSD та проаналізувати трендів вразливості RowHummer для різних виробників DRAM. Сформувати прогнози розвитку.
Valentyn Mazurok, Vladimir Lutsenko
doaj +1 more source
Capacity of Coded Index Modulation
We consider the special case of index coding over the Gaussian broadcast channel where each receiver has prior knowledge of a subset of messages at the transmitter and demands all the messages from the source.
Hong, Yi +2 more
core +1 more source
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy.
Gregor Tamati Haywood +1 more
doaj +1 more source
Numerical simulation of hydro-and morfodynamic effects of side channels design parameters [PDF]
Four side channel design parameters are analysed by two-dimensionally modelling the extremes with the numerical software package Delft3D. In order to advise how to minimise the maintenance activity dredging in rivers due to the construction of side ...
Schuurman, P.K.
core +1 more source
Private Colleges, State Aid, and the Establishment Clause [PDF]
Using local scanning electrical techniques we study edge effects in side-gated Hall bar nanodevices made of epitaxial graphene. We demonstrate that lithographically defined edges of the graphene channel exhibit hole conduction within the narrow band of ...
Kazakova, Olga +5 more
core +3 more sources
This chapter presents the main Side-Channel Attacks, a kind of hardware cryptanalytic techniques which exploits the physical behavior of an IC to extract secrets implied in cryptographic operations. We show in this chapter the main modern concepts about Side Channel Attacks (Simple and Differential Power Analysis) and how they can be deployed on FPGA ...
Lomné, Victor +4 more
openaire +2 more sources
Side-channel indistinguishability [PDF]
We introduce a masking strategy for hardware that prevents any side-channel attacker from recovering uniquely the secret key of a cryptographic device. In this masking scheme, termed homomorphic, the sensitive data is exclusive-ored with a random value that belongs to a given set. We show that if this masking set is concealed, then no information about
Claude Carlet, Sylvain Guilley
openaire +1 more source

