Results 21 to 30 of about 1,407,158 (281)
On Non-Completeness and G-Equivariance
With the growing threat of the side-channel attack (SCA) to the cryptographic algorithm’s implementations, the masking method has become one of the most promising SCA countermeasures for securely implementing, for example, block ciphers.
Yoo-Jin Baek
doaj +1 more source
DPA Protected Implementation of OCB and COLM Authenticated Ciphers
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani +2 more
doaj +1 more source
Structural assessment and expected utility gain
This paper contains an introduction, probabilistic formulation, and exemplification (1) of system state and utility actions, (2) system state and utility action value analysis and (3) a threshold formulation for a predicted information and action ...
Sebastian Thöns
doaj +1 more source
Efficient realization of a threshold voter for self-purging redundancy [PDF]
The self-purging technique is not commonly used mainly due to the lack of practical implementations of its key component, the threshold voter.
Avedillo de Juan, María José +2 more
core +1 more source
Recurrent spiking neural networks have garnered interest due to their energy efficiency; however, they suffer from lower accuracy compared to conventional neural networks.
Ahmed Shaban +2 more
doaj +1 more source
Parallel Approach of Adaptive Image Thresholding Algorithm on GPU
Image thresholding is used to segment an image into background and foreground using a given threshold. The threshold can be generated using a specific algorithm instead of a pre-defined value obtained from observation or experiment.
Adhi Prahara +3 more
doaj +1 more source
3-Share Threshold Implementation of AES S-box without Fresh Randomness
Threshold implementation is studied as a countermeasure against sidechannel attack. There had been no threshold implementation for the AES and Keccak S-boxes that satisfies an important property called uniformity.
Takeshi Sugawara
doaj +1 more source
A practical floating-gate Muller-C element using vMOS threshold gates [PDF]
This paper presents the rationale for vMOS-based realizations of digital circuits when logic design techniques based on threshold logic gates are used. Some practical problems in the vMOS implementation of threshold gates have been identified and solved.
Avedillo de Juan, María José +4 more
core +1 more source
As an important means to promote regional low-carbon development, environmental regulation has great theoretical and practical significance for achieving the goal of carbon-neutral development in China.
Xueqin Dong +5 more
doaj +1 more source
FPGA-based implementation of the back-EMF symmetric-threshold-tracking sensorless commutation method for brushless DC-machines [PDF]
The operation of brushless DC permanent-magnet machines requires information of the rotor position to steer the semiconductor switches of the power-supply module which is commonly referred to as Brushless Commutation. Different sensorless techniques have
Darba, Araz +3 more
core +1 more source

