نتایج جستجو برای: sensitive synthetic schemes side

تعداد نتایج: 715793  

Journal: :Applied physics letters 2015
Fredrick A South Yuan-Zhi Liu Yang Xu Nathan D Shemonski P Scott Carney Stephen A Boppart

Three-dimensional optical microscopy suffers from the well-known compromise between transverse resolution and depth-of-field. This is true for both structural imaging methods and their functional extensions. Interferometric synthetic aperture microscopy (ISAM) is a solution to the 3D coherent microscopy inverse problem that provides depth-independent transverse resolution. We demonstrate the ex...

2010
Bo Hu Jin Du Rui-yang Zou Ying-jin Yuan

Microbial ecosystems have been widely used in industrial production, but the inter-relationships of organisms within them haven't been completely clarified due to complex composition and structure of natural microbial ecosystems. So it is challenging for ecologists to get deep insights on how ecosystems function and interplay with surrounding environments. But the recent progresses in synthetic...

2008
R Rajesh Vinod Sharma

We consider the transmission of correlated Gaussian sources over a Gaussian multiple access channel (GMAC) with side information. Three joint source-channel coding schemes: Amplify and Forward (AF), Separation based (SB) and a coding scheme developed by Lapidoth and Tinguely (LT) are studied. Various methods are proposed to effectively utilize the side information with these schemes such that t...

Mehran Miroliaei, Morteza Sadeghi,

Given the prevalence of diabetes and the increasing number of diabetics, it is essential to find medicines to decrease the chronic complications of diabetes. Several studies have demonstrated that chronic hyperglycemia and its complications are directly related to protein glycation. Thus, identifying natural inhibitors to stop glycation of proteins may play a crucial role in managing the chroni...

2012
Amir Moradi Oliver Mischke

Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing securi...

2012
Amir Moradi Oliver Mischke

Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing securi...

2000
Anton Kos Borut Klepec

The Internet traditionally provides service that is commonly characterised as a best-effort service. Many applications run very well using this service model but some new interactive applications such as telephony or video conferencing impose stringent demands to the network. In this paper we discuss a proposal for changing the architecture of IP networks in order to provide some level of servi...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2013
Miriam Amiram Kelli M Luginbuhl Xinghai Li Mark N Feinglos Ashutosh Chilkoti

Peptide drugs are an exciting class of pharmaceuticals increasingly used for the treatment of a variety of diseases; however, their main drawback is a short half-life, which dictates multiple and frequent injections and an undesirable "peak-and-valley" pharmacokinetic profile, which can cause undesirable side-effects. Synthetic prolonged release formulations can provide extended release of biol...

2002
John Black Hector Urtubia

Vaudenay recently demonstrated side-channel attacks on a common encryption scheme, CBC Mode encryption, exploiting a “valid padding” oracle [Vau02]. Mirroring the side-channel attacks of Bleichenbacher [Ble98] and Manger [Man01] on asymmetric schemes, he showed that symmetric encryption methods are just as vulnerable to side-channel weaknesses when an adversary is able to distinguish between va...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید