Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Shohreh Sharif"'
One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. In this paper we design a new type
Externí odkaz:
http://arxiv.org/abs/1207.4017
A common approach to protect confidential information is to use a stream cipher which combines plain text bits with a pseudo-random bit sequence. Among the existing stream ciphers, Non-Linear Feedback Shift Register (NLFSR)-based ones provide the bes
Externí odkaz:
http://arxiv.org/abs/0910.5595
Publikováno v:
International Journal of Environmental Research and Public Health. 20:5585
Infantile hemangioma (IH) is important to all dentists, particularly dentists providing services to pediatric populations, because significant morbidity and mortality can occur from vascular lesions in children. Specialists of the oral cavity have th
Autor:
Shohreh Sharif Mansouri, Elena Dubrova
Publikováno v:
Information Security and Cryptology--ICISC 2013 ISBN: 9783319121598
ICISC
ICISC
One of the most common types of Physical Unclonable Functions (PUFs) is the ring oscillator PUF (RO-PUF), a type of PUF in which the output bits are obtained by comparing the oscillation frequencies of different ring oscillators. One application of R
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa906f37b89fe6a2c6ced44db8cddc7f
https://doi.org/10.1007/978-3-319-12160-4_15
https://doi.org/10.1007/978-3-319-12160-4_15
Autor:
Shohreh Sharif Mansouri, Elena Dubrova
Publikováno v:
DSD
We introduce a power optimization technique for suppression countermeasures against Power Analysis attacks that can potentially be applied to any type of crypto-system implemented as a synchronous digital system. Since the power consumption of system
Publikováno v:
ISMVL
In hardware implementations of cryptographic systems, secret keys are commonly stored in an on-chip memory. This makes them prone to physical attacks, since the location of a memory on a chip in usually easy to spot. We propose to encode secret keys
Autor:
Elena Dubrova, Shohreh Sharif Mansouri
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642376818
ICISC
ICISC
We study efficient high-throughput hardware implementations of the Grain-128a family of stream ciphers. To increase the throughput compared to the standard design, we apply five different techniques in combination: isolation of the authentication sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac19a90ef8f5541660a1381c1a4a1bbf
https://doi.org/10.1007/978-3-642-37682-5_20
https://doi.org/10.1007/978-3-642-37682-5_20
Autor:
Shohreh Sharif Mansouri, Elena Dubrova
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642413315
RFIDSec
RFIDSec
We present an implementation of U-Quark, the lightest instance of the Quark family of hash functions, which is optimized for throughput. The throughput is increased by converting the Feedback Shift Registers (FSRs) of Quarks permutation block from th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::47980ef6f8ea4b0c115b0ff15390523c
https://doi.org/10.1007/978-3-642-41332-2_8
https://doi.org/10.1007/978-3-642-41332-2_8
Autor:
Zahra Eslami, Zeinab Mohammadi, Shohreh Sharifian, Masoumeh Rezaei Ghomi, Seyedeh Vafa Mousavi, Mahboubeh Farhadi, Najmeh Sheikh Robati, Zeinab Faghfoori, Seyed Javad Mirghani
Publikováno v:
مجله دانشگاه علوم پزشکی گرگان, Vol 23, Iss 3, Pp 32-39 (2021)
Background and Objective: Stroke and cerebral ischemia are the second leading causes of death in the world. Currently, there are limited therapeutic interventions for patients with ischemia / reperfusion. This study was performed to determine the pro
Externí odkaz:
https://doaj.org/article/6c5c4b8c33264f21a3ff62cb42403897
Autor:
Shohreh Sharif Mansouri, Elena Dubrova
Publikováno v:
ISMVL
Cyclic Redundancy Check codes (CRC) are widely used in data communication and storage devices for detecting burst errors. In applications requiring high-speed data transmission, multiple bits of an CRC are computed in parallel. Traditional methods fo