نتایج جستجو برای: xor gate
تعداد نتایج: 44318 فیلتر نتایج به سال:
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
Xoring two permutations is a very simple way to construct pseudorandom functions from pseudorandom permutations. In [14], it is proved that we have security against CPA-2 attacks when m O(2), where m is the number of queries and n is the number of bits of the inputs and outputs of the bijections. In this paper, we will obtain similar (but slightly different) results by using the “standard H tec...
Data from 43 countries were used to examine the negative association between ambient temperature and economic prosperity during the 1965±1994 period from a cross-cultural perspective. Surprisingly, the inhabitants' overall level of cultural competitiveness does not aect economic growth. However, positive temperature±competitiveness and negative competitiveness±wealth relations do account for t...
A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT [1] and SPONGENT [2]). In order to efficiently implement the primitive, efficient implementations of its internal components are needed. Multiplicative complexity of a function is the minimum number of AND gates ...
We study deep inelastic scattering in gauge theories which have dual string descriptions. As a function of gN we find a transition. For small gN , the dominant operators in the OPE are the usual ones, of approximate twist two, corresponding to scattering from weakly interacting partons. For large gN , double-trace operators dominate, corresponding to scattering from entire hadrons (either the o...
Semiconductor supply chain is increasingly getting exposed to variety of security attacks such as Trojan insertion, cloning, counterfeiting, reverse engineering (RE), piracy of Intellectual Property (IP) or Integrated Circuit (IC) and side-channel analysis due to involvement of untrusted parties. In this paper, we propose transistor threshold voltage-defined switches to camouflage the logic gat...
Huiru Zhao 1, Haoran Zhao 1,*, Sen Guo 1,*, Fuqiang Li 2 and Yuou Hu 2 1 School of Economics and Management, North China Electric Power University, Beijing 102206, China; [email protected] 2 North China Grid Company Limited, No. 482 Canton Avenue, Beijing Xuanwu District, Beijing 100053, China; [email protected] (F.L.); [email protected] (Y.H.) * Correspondence: [email protected] (H.Z.); g...
Scalable Distributed Data Structures (SDDS) need scalable availability. This can be provided through replication, which is storage intensive, or through the use of Erasure Correcting Codes (ECC) to provide redundancy, which is more complicated. We calculate availability under both strategies and show that redundancy through use of an ECC implies significantly less overhead. We introduce a gener...
In this paper, a new simple and fast algorithm for image encryption is proposed. It exploits the scan patterns and function XOR in three standalone steps. The decryption procedure is similar to that of the encryption but in the reversed order. We implement and test the proposed algorithm using different sample image inputs and our experimental result and security analysis indicates the robustne...
Shankar Iyer,1 Vadim Oganesyan,2,3,4 Gil Refael,1 and David A. Huse5 1Department of Physics, California Institute of Technology, MC 149-33, 1200 E. California Blvd., Pasadena, California 91125, USA 2Department of Engineering Science and Physics, College of Staten Island, CUNY, Staten Island, New York 10314, USA 3The Graduate Center, CUNY, 365 5th Ave., New York, New York 10016, USA 4KITP, UCSB,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید