نتایج جستجو برای: time code

تعداد نتایج: 2017764  

Journal: :Information Technology Journal 2008

Journal: :European Journal of Combinatorics 2013

Journal: :IEEE Transactions on Information Theory 2013

Journal: :Designs, Codes and Cryptography 2021

We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW). The private key in SHMWW contains columns coming part from identity matrix random matrix. existence of two types leads to strong bias distribution set bits produced signatures. Our exploits such recover bunch collected provide theoreti...

2002
Peter P. Puschner

Traditional Worst-Case Execution-Time (WCET) analysis is very complex. It has to deal with path analysis, to identify and describe the possible execution paths through the code to be analyzed, and it has to model the worst-case timing of the possible paths on the target hardware. The latter is again nontrivial due to interference of modern hardware features like instruction pipelines, caches, a...

Journal: :ACM Transactions on Privacy and Security 2019

Journal: :Proceedings of the National Academy of Sciences 2012

Journal: :IEEE Transactions on Information Theory 2005

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید