Results 61 to 70 of about 16,624 (253)

On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
White-box cryptography aims at protecting implementations of cryptographic algorithms against a very powerful attacker who controls the execution environment. The first defensive brick traditionally embedded in such implementations consists of encodings,
Laurent Castelnovi, Agathe Houzelot
doaj   +1 more source

Celulární automat a CML systémy [PDF]

open access: yes, 2018
The main aim of this thesis is the study of cellular automata and discrete dynamical systems on a lattice. Both tools, cellular automata as well as dynamical systems on a lattice are introduced and elementary properties described.
Štula, Václav
core  

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Spartan Daily October 12, 2011 [PDF]

open access: yes, 2011
Volume 137, Issue 25https://scholarworks.sjsu.edu/spartandaily/1079/thumbnail ...
San Jose State University, School of Journalism and Mass Communications
core   +1 more source

Vestibular Patient Journey: Insights From Vestibular Disorders Association (VeDA) Registry

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Vestibular symptoms impose a high burden of disability. Understanding real‐world diagnostic and treatment pathways can identify care gaps and guide interventions. We aimed to characterize symptom profiles, diagnostic trends, provider involvement, and treatment patterns in vestibular disorders.
Ali Rafati   +10 more
wiley   +1 more source

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

A Prospective Study of Individuals at Risk of Multiple Sclerosis Informs the Design of Primary Prevention Studies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective In multiple sclerosis, the optimal time for deploying a therapeutic intervention is before the central nervous system is damaged; given the success of trials treating the earliest stage of MS, the radiologically isolated syndrome, developing primary prevention strategies is an important next challenge.
Amy W. Laitinen   +7 more
wiley   +1 more source

UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
White-box cryptography (WBC) seeks to protect secret keys even if the attacker has full control over the execution environment. One of the techniques to hide the key is space hardness approach, which conceals the key into a large lookup table generated ...
Xiangren Chen   +8 more
doaj   +1 more source

Stopping time signatures for some algorithms in cryptography [PDF]

open access: yes, 2019
We consider the normalized distribution of the overall running times of some cryptographic algorithms, and what information they reveal about the algorithms.
Deift, Percy   +2 more
core   +1 more source

On the practical security of white-box cryptography

open access: yes, 2020
Cryptography studies how to secure communications and information. The security of a cryptosystem depends on the secrecy of the underlying key. White-box cryptography explores methods to hide a cryptographic key into some software deployed in the real world.
openaire   +2 more sources

Home - About - Disclaimer - Privacy