نتایج جستجو برای: exclusive orxor gate
تعداد نتایج: 70849 فیلتر نتایج به سال:
An increasing number of lightweight cryptographic primitives have been published in the last years. Some of these proposals only use additions, rotations and XORs, and these ARX primitives have shown a great performance in software. In this paper, a computer tool to automate the security evaluation of ARX block ciphers is shown. Our tool takes a Python implementation of an ARX block cipher and ...
We define a framework to reason about sound implemen-tations of equational theories in the presence of an adap-tive adversary. In particular, we focus on soundess of staticequivalence. We illustrate our framework on several equa-tional theories: symmetric encryption, XOR, modular expo-nentiation and also joint theories of encryption and modu-lar exponentiation as well as...
Currently there is great interest in the development of (bio)chemical devices that can act as logic gates at the molecular level. In this work we show that the protein cytochrome c (cyt c) can be used to perform a variety of logic operations such as YES, NOT, AND, OR, and XOR. The protein accepts chemical input signals in the form of denaturants that can induce unfolding of the polypeptide chai...
Nanosystems are large-scale integrated systems exploiting nanoelectronic devices. In this study, we consider double independent gate, vertically stacked nanowire field effect transistors (FETs) with gate-all-around structures and typical diameter of 20 nm. These devices, which we have successfully fabricated and evaluated, control the ambipolar behaviour of the nanostructure by selectively enab...
We present a scheme designed to suppress the dominant source of infidelity in entangling gates between quantum systems coupled through intermediate bosonic oscillator modes. Such systems are particularly susceptible to residual qubit-oscillator entanglement at the conclusion of a gate period that reduces the fidelity of the target entangling operation. We demonstrate how the exclusive use of di...
In this paper, we have developed a modification to the Feistel cipher by taking the plaintext in the form of a pair of matrices and introducing a set of functions namely, substitute, shifting of rows, mixing of columns and XOR operation with a key. Further we have supplemented this process by using another function called shuffling at the end of each round of the iteration process. In this anal...
Stringent power and performance constraints, coupled with detailed knowledge of the target applications of a processor, allows for application-specific processor optimizations. It has been shown that application-specific reconfigurable hash functions eliminate a large number of cache conflict misses. These hash functions minimize conflicts by modifying the mapping of cache blocks to cache sets....
In this paper we demonstrate the first real-world cloning attack on a commercial PUF-based RFID tag. The examined commercial PUFs can be attacked by measuring only 4 protocol executions, which takes less than 200 ms. Using a RFID smartcard emulator, it is then possible to impersonate, i.e., “clone” the PUF. While attacking the 4-way PUF used by these tags can be done using traditional machine l...
There is a close connection between Direct Product and XOR lemmas in the sense that in many settings, we can prove one given the other. The known reductions that are used for the above purpose are either in the non-uniform setting or give non-matching parameters. By non-matching parameter we mean that k-wise Direct Product lemma implies k′-wise XOR lemma (and vice versa) for k 6= k′. In this wo...
Intrinsically disordered proteins (IDP) appear far more likely to engage in functional moonlighting than well-structured proteins. The recent use of nonrigid molecule theory to address IDP structure and dynamics produces this result directly: Mirror image subgroup or subgroupoid tiling matching of the molecular fuzzy lock-and-key can be much richer for IDP’s since the number possible group or g...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید