Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Efficient implementations"'
Publikováno v:
IEEE Access, Vol 10, Pp 5957-5967 (2022)
The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics. However, the proposed tech
Externí odkaz:
https://doaj.org/article/9c8db702dc574636a1d72641beacf47f
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Dinu, Dumitru-Daniel
This thesis is devoted to efficient and secure implementations of lightweight symmetric cryptographic primitives for resource-constrained devices such as wireless sensors and actuators that are typically deployed in remote locations. In this setting,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::6454d0292f09735e20907356149dcb17
http://orbilu.uni.lu/handle/10993/33803
http://orbilu.uni.lu/handle/10993/33803
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Michael Davies, Mehrdad Yaghoobi
Publikováno v:
EUSIPCO
Yaghoobi Vaighan, M & Davies, M 2015, Fast non-negative orthogonal least squares . in 2015 23rd European Signal Processing Conference, EUSIPCO 2015 ., 7362429, Institute of Electrical and Electronics Engineers Inc., pp. 479-483, 23rd European Signal Processing Conference, EUSIPCO 2015, Nice, France, 31/08/15 . https://doi.org/10.1109/EUSIPCO.2015.7362429
Yaghoobi Vaighan, M & Davies, M 2015, Fast non-negative orthogonal least squares . in 2015 23rd European Signal Processing Conference, EUSIPCO 2015 ., 7362429, Institute of Electrical and Electronics Engineers Inc., pp. 479-483, 23rd European Signal Processing Conference, EUSIPCO 2015, Nice, France, 31/08/15 . https://doi.org/10.1109/EUSIPCO.2015.7362429
An important class of sparse signals is the non-negative sparse signals. While numerous greedy techniques have been introduced for low-complexity sparse approximations, there are few non-negative versions. Among such a large class of greedy technique
Publikováno v:
IEEE Transactions on Computers, Vol. 52, no. 4, p. 473-482 (2004)
In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, outputbits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are
In this paper, we introduce computationally efficient imple- mentations of the data-dependent non-parametric damped Capon (dCapon) and APES (dAPES) spectral estimators. These estimators form two-dimensional frequency represen- tations over both frequ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19a4ae1fe2f534ff20c38ca992d2b9ec
http://lup.lub.lu.se/record/3991197/file/3991201.pdf
http://lup.lub.lu.se/record/3991197/file/3991201.pdf
Publikováno v:
Journal of Parallel and Distributed Computing
J.Parallel Distrib.Comput.
SPAA
J.Parallel Distrib.Comput.
SPAA
This paper investigates time-efficient implementations of atomic read-write registers in message-passing systems where the number of readers can be unbounded. In particular we study the case of a single writer, multiple readers, and S servers, such t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8c9e641587bf2759a59a64d345cc8aa3
http://gnosis.library.ucy.ac.cy/handle/7/53997
http://gnosis.library.ucy.ac.cy/handle/7/53997
Autor:
Standaert, François-Xavier, Quisquater, Jean-Jacques, Legat, Jean-Didier, Piret, G., Rouvroy, G., 11th International Workshop on Fast Software Encryption
Publikováno v:
Lecture Notes in Computer Science, Vol. 3017, p. 279-298 (2004)
We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardw
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1493::497b21605e936e8dab81a9c901cc0572
https://hdl.handle.net/2078.1/61257
https://hdl.handle.net/2078.1/61257