نتایج جستجو برای: گیت xor
تعداد نتایج: 3115 فیلتر نتایج به سال:
MDS matrices are used as building blocks of diffusion layers in block ciphers, and XOR count is a metric that estimates the hardware implementation cost. In this paper we report the minimum value of XOR counts of 4 × 4 MDS matrices over F24 and F28 , respectively. We give theoretical constructions of Toeplitz MDS matrices and show that they achieve the minimum XOR count. We also prove that Toep...
AND XOR networks include all realizations of switching functions in two and multi level which in clude AND XOR and inverters as basic building blocks It has been shown that for many AND XOR canonical networks and trees the test set to detect stuck at faults and bridging faults are independent of the function being realized This paper provides a survey of these studies and introduces certain res...
CVT and XOR are two binary operations together used to calculate the sum of two non-negative integers on using a recursive mechanism. In this present study the convergence behaviors of this recursive mechanism has been captured through a tree like structure named as CVT-XOR Tree. We have analyzed how to identify the parent nodes, leaf nodes and internal nodes in the CVT-XOR Tree. We also provid...
We show a new duality between the polynomial margin complexity of f and the discrepancy of the function f ◦XOR, called an XOR function. Using this duality, we develop polynomial based techniques for understanding the bounded error (BPP) and the weakly-unbounded error (PP) communication complexities of XOR functions. This enables us to show the following. • A weak form of an interesting conjectu...
Xanthine oxidoreductase (XOR) is the enzyme responsible for the final step in purine degradation resulting in the generation of uric acid. Here we have generated mice deficient in XOR. As expected, these animals lack tissue XOR activity and have low to undetectable serum levels of uric acid. Although normal at birth, XOR-/- mice fail to thrive after 10 to 14 days, and most die within the first ...
Network coding is a promising technology that increases the system throughput via reducing the number of transmissions for the packets delivered from the source node to the destination node in the saturated traffic scenario. Nevertheless, some packets can suffer from the metric of end-to-end delay. Since it takes the queuing delay in the intermediate node to wait for other packets to be encoded...
Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security primitive in various security applications such as device identification, authentication, and cryptographic key generation. Current so-called ‘strong’ PUFs, which allow a large challenge response space, are compositions of Arbiter PUFs (APUFs), e.g. the x-XOR APUF. Wide scale deployment of state-oft...
Most implementations of Yao’s garbled circuit approach for 2-party secure computation use the free-XOR optimization of Kolesnikov & Schneider (ICALP 2008). We introduce an alternative technique called flexible-XOR (fleXOR) that generalizes free-XOR and offers several advantages. First, fleXOR can be instantiated under a weaker hardness assumption on the underlying cipher/hash function (related-...
مدل جامعی برای یک خازن MOS، که به صورت یک MOSFET n- کانال نوع تخلیه ای در یک فن آوری CMOS زیر میکرونی پیاده سازی شده است، ارائه می شود. این مدل وابستگی ظرفیت خازنی به ولتاژ گیت را روی تمام گستره ولتاژ های عملیاتی منظور می کند و برازش آن به داده های اندازه گیری شده ظرفیت خازنی بر حسب ولتاژ گیت با ضریب همبستگی 99/0 مشخص می شود. با در نظر گرفتن خازن گیت و مقاومت سری مربوط به آن به صورت یک شبه RC گ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید