Results 21 to 30 of about 1,415,224 (299)

Threshold Implementations in the Robust Probing Model [PDF]

open access: yesProceedings of ACM Workshop on Theory of Implementation Security Workshop, 2019
Threshold Implementations (TI) are provably secure algorithmic countermeasures against side-channel attacks in the form of differential power analysis. The strength of TI lies in its minimal algorithmic requirements. These requirements have been studied over more than 10 years and many efficient implementations for symmetric primitives have been ...
Dhooghe, Siemen   +2 more
openaire   +2 more sources

On Non-Completeness and G-Equivariance

open access: yesApplied Sciences, 2019
With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers.
Yoo-Jin Baek
doaj   +1 more source

A practical floating-gate Muller-C element using vMOS threshold gates [PDF]

open access: yes, 2001
This paper presents the rationale for vMOS-based realizations of digital circuits when logic design techniques based on threshold logic gates are used. Some practical problems in the vMOS implementation of threshold gates have been identified and solved.
Avedillo de Juan, María José   +4 more
core   +1 more source

DPA Protected Implementation of OCB and COLM Authenticated Ciphers

open access: yesIEEE Access, 2019
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani   +2 more
doaj   +1 more source

Efficient realization of a threshold voter for self-purging redundancy [PDF]

open access: yes, 2001
The self-purging technique is not commonly used mainly due to the lack of practical implementations of its key component, the threshold voter.
Avedillo de Juan, María José   +2 more
core   +1 more source

Structural assessment and expected utility gain

open access: yesActa Polytechnica CTU Proceedings, 2022
This paper contains an introduction, probabilistic formulation, and exemplification (1) of system state and utility actions, (2) system state and utility action value analysis and (3) a threshold formulation for a predicted information and action ...
Sebastian Thöns
doaj   +1 more source

3-Share Threshold Implementation of AES S-box without Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj   +1 more source

An adaptive threshold neuron for recurrent spiking neural networks with nanodevice hardware implementation

open access: yesNature Communications, 2021
Recurrent spiking neural networks have garnered interest due to their energy efficiency; however, they suffer from lower accuracy compared to conventional neural networks.
Ahmed Shaban   +2 more
doaj   +1 more source

Parallel Approach of Adaptive Image Thresholding Algorithm on GPU

open access: yesKnowledge Engineering and Data Science, 2022
Image thresholding is used to segment an image into background and foreground using a given threshold. The threshold can be generated using a specific algorithm instead of a pre-defined value obtained from observation or experiment.
Adhi Prahara   +3 more
doaj   +1 more source

FPGA Implementation of Threshold-Type Binary Memristor and Its Application in Logic Circuit Design

open access: yesMicromachines, 2021
In this paper, a memristor model based on FPGA (field programmable gate array) is proposed, by using which the circuit of AND gate and OR gate composed of memristors is built. Combined with the original NOT gate in FPGA, the NAND gate, NOR gate, XOR gate
Liu Yang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy