نتایج جستجو برای: sensitive synthetic schemes side
تعداد نتایج: 715793 فیلتر نتایج به سال:
Three-dimensional optical microscopy suffers from the well-known compromise between transverse resolution and depth-of-field. This is true for both structural imaging methods and their functional extensions. Interferometric synthetic aperture microscopy (ISAM) is a solution to the 3D coherent microscopy inverse problem that provides depth-independent transverse resolution. We demonstrate the ex...
Microbial ecosystems have been widely used in industrial production, but the inter-relationships of organisms within them haven't been completely clarified due to complex composition and structure of natural microbial ecosystems. So it is challenging for ecologists to get deep insights on how ecosystems function and interplay with surrounding environments. But the recent progresses in synthetic...
We consider the transmission of correlated Gaussian sources over a Gaussian multiple access channel (GMAC) with side information. Three joint source-channel coding schemes: Amplify and Forward (AF), Separation based (SB) and a coding scheme developed by Lapidoth and Tinguely (LT) are studied. Various methods are proposed to effectively utilize the side information with these schemes such that t...
Given the prevalence of diabetes and the increasing number of diabetics, it is essential to find medicines to decrease the chronic complications of diabetes. Several studies have demonstrated that chronic hyperglycemia and its complications are directly related to protein glycation. Thus, identifying natural inhibitors to stop glycation of proteins may play a crucial role in managing the chroni...
Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing securi...
Several masking schemes to protect cryptographic implementations against side-channel attacks have been proposed. A few considered the glitches, and provided security proofs in presence of such inherent phenomena happening in logic circuits. One which is based on multi-party computation protocols and utilizes Shamir’s secret sharing scheme was presented at CHES 2011. It aims at providing securi...
The Internet traditionally provides service that is commonly characterised as a best-effort service. Many applications run very well using this service model but some new interactive applications such as telephony or video conferencing impose stringent demands to the network. In this paper we discuss a proposal for changing the architecture of IP networks in order to provide some level of servi...
Peptide drugs are an exciting class of pharmaceuticals increasingly used for the treatment of a variety of diseases; however, their main drawback is a short half-life, which dictates multiple and frequent injections and an undesirable "peak-and-valley" pharmacokinetic profile, which can cause undesirable side-effects. Synthetic prolonged release formulations can provide extended release of biol...
Vaudenay recently demonstrated side-channel attacks on a common encryption scheme, CBC Mode encryption, exploiting a “valid padding” oracle [Vau02]. Mirroring the side-channel attacks of Bleichenbacher [Ble98] and Manger [Man01] on asymmetric schemes, he showed that symmetric encryption methods are just as vulnerable to side-channel weaknesses when an adversary is able to distinguish between va...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید