Results 21 to 30 of about 1,407,158 (281)

On Non-Completeness and G-Equivariance

open access: yesApplied Sciences, 2019
With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers.
Yoo-Jin Baek
doaj   +1 more source

DPA Protected Implementation of OCB and COLM Authenticated Ciphers

open access: yesIEEE Access, 2019
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani   +2 more
doaj   +1 more source

Structural assessment and expected utility gain

open access: yesActa Polytechnica CTU Proceedings, 2022
This paper contains an introduction, probabilistic formulation, and exemplification (1) of system state and utility actions, (2) system state and utility action value analysis and (3) a threshold formulation for a predicted information and action ...
Sebastian Thöns
doaj   +1 more source

Efficient realization of a threshold voter for self-purging redundancy [PDF]

open access: yes, 2001
The self-purging technique is not commonly used mainly due to the lack of practical implementations of its key component, the threshold voter.
Avedillo de Juan, María José   +2 more
core   +1 more source

An adaptive threshold neuron for recurrent spiking neural networks with nanodevice hardware implementation

open access: yesNature Communications, 2021
Recurrent spiking neural networks have garnered interest due to their energy efficiency; however, they suffer from lower accuracy compared to conventional neural networks.
Ahmed Shaban   +2 more
doaj   +1 more source

Parallel Approach of Adaptive Image Thresholding Algorithm on GPU

open access: yesKnowledge Engineering and Data Science, 2022
Image thresholding is used to segment an image into background and foreground using a given threshold. The threshold can be generated using a specific algorithm instead of a pre-defined value obtained from observation or experiment.
Adhi Prahara   +3 more
doaj   +1 more source

3-Share Threshold Implementation of AES S-box without Fresh Randomness

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj   +1 more source

A practical floating-gate Muller-C element using vMOS threshold gates [PDF]

open access: yes, 2001
This paper presents the rationale for vMOS-based realizations of digital circuits when logic design techniques based on threshold logic gates are used. Some practical problems in the vMOS implementation of threshold gates have been identified and solved.
Avedillo de Juan, María José   +4 more
core   +1 more source

Research on the impacts of dual environmental regulation on regional carbon emissions under the goal of carbon neutrality-the intermediary role of green technology innovation

open access: yesFrontiers in Environmental Science, 2022
As an important means to promote regional low-carbon development, environmental regulation has great theoretical and practical significance for achieving the goal of carbon-neutral development in China.
Xueqin Dong   +5 more
doaj   +1 more source

FPGA-based implementation of the back-EMF symmetric-threshold-tracking sensorless commutation method for brushless DC-machines [PDF]

open access: yes, 2013
The operation of brushless DC permanent-magnet machines requires information of the rotor position to steer the semiconductor switches of the power-supply module which is commonly referred to as Brushless Commutation. Different sensorless techniques have
Darba, Araz   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy