Zobrazeno 1 - 10
of 111
pro vyhledávání: '"Yinan Kong"'
Publikováno v:
IEEE Access, Vol 8, Pp 184298-184311 (2020)
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performance, suppressing the traditional side-channel analysis. To launch the successful attack on a particular public key cryptographic (PKC) algorithm, a lar
Externí odkaz:
https://doaj.org/article/58c4ffdb074b4fb0b23bbb566210d5d9
Autor:
Afshin Shoeibi, Delaram Sadeghi, Parisa Moridian, Navid Ghassemi, Jónathan Heras, Roohallah Alizadehsani, Ali Khadem, Yinan Kong, Saeid Nahavandi, Yu-Dong Zhang, Juan Manuel Gorriz
Publikováno v:
Frontiers in Neuroinformatics, Vol 15 (2021)
Schizophrenia (SZ) is a mental disorder whereby due to the secretion of specific chemicals in the brain, the function of some brain regions is out of balance, leading to the lack of coordination between thoughts, actions, and emotions. This study pro
Externí odkaz:
https://doaj.org/article/1600f8bfca8542d1a2ffc6f46ab008c8
Autor:
Niras Cheeckottu Vayalil, Yinan Kong
Publikováno v:
IET Circuits, Devices and Systems, Vol 11, Iss 6, Pp 543-548 (2017)
Motion estimation (ME) is the most computationally intensive task in video encoding. This study proposes a full‐search variable‐block‐size ME for the high‐efficiency video coding or H.265 specification. The proposed method reduces memory requ
Externí odkaz:
https://doaj.org/article/f70f3bdc246c4a3e862d3f2ddd0b2e9c
Publikováno v:
PLoS ONE, Vol 12, Iss 5, p e0176214 (2017)
In this paper, we propose a novel parallel architecture for fast hardware implementation of elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve cryptography processor. The point multiplication over binary field
Externí odkaz:
https://doaj.org/article/7debdaf77810476d9b44d61df9e092d5
Publikováno v:
Applied Sciences, Vol 9, Iss 1, p 64 (2018)
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving
Externí odkaz:
https://doaj.org/article/b8ff831dd3644ce09a9aae85fc54aec0
Autor:
Abdullah-Al Nahid, Yinan Kong
Publikováno v:
Information, Vol 9, Iss 1, p 19 (2018)
Identification of the malignancy of tissues from Histopathological images has always been an issue of concern to doctors and radiologists. This task is time-consuming, tedious and moreover very challenging. Success in finding malignancy from Histopat
Externí odkaz:
https://doaj.org/article/3373f3afa7aa40e1a89c45735b5ccddd
Autor:
Yinan Kong, Braden Phillips
Publikováno v:
Journal of Electrical and Computer Engineering, Vol 2010 (2010)
In the 1980s, when the introduction of public key cryptography spurred interest in modular multiplication, many implementations performed modular multiplication using a sum of residues. As the field matured, sum of residues modular multiplication los
Externí odkaz:
https://doaj.org/article/0d499ce49ede47edacaba2f1cebef4f4
Publikováno v:
Chemical communications (Cambridge, England). 58(97)
Reported here are two X-ray photochromic metal chalcogenide frameworks, which consist of tetrahedral clusters that are linked by transition-metal amine chelates. They have similar structures, but with different organic amine species, and they exhibit
Publikováno v:
Electronics; Volume 11; Issue 21; Pages: 3548
The uncertainty of noise statistics in dynamic systems is one of the most important issues in engineering applications, and significantly affects the performance of state estimation. The optimal Bayesian Kalman filter (OBKF) is an important approach
Publikováno v:
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030997656
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::54f838fc4ab6f4ec7316cf6b6e203c7c
https://doi.org/10.1007/978-3-030-99766-3_1
https://doi.org/10.1007/978-3-030-99766-3_1