نتایج جستجو برای: Leakage Exponent

تعداد نتایج: 49437  

Journal: :محیط شناسی 0
محمدرضا جلیلی قاضی زاده استادیار دانشکده عمران، آب و محیط زیست، دانشگاه شهید بهشتی ضیاالدین ایدی دانشجوی دکتری سازه های هیدرولیکی، دانشگاه رازی

extended abstract abstract pressure management is an effective method for water demand management. for evaluation of the effects of pressure changes on leakage level of water networks, the favad equation is usually used. however, in this equation, exponent of pressure parameter (n) needs to be determined. for estimation of n, either some information about the leak opening is necessary or networ...

Journal: :Transactions of the Architectural Institute of Japan 1984

Journal: :IACR Cryptology ePrint Archive 2013
Johann Heyszl Andreas Ibing Stefan Mangard Fabrizio De Santis Georg Sigl

Most implementations of public key cryptography employ exponentiation algorithms. Side-channel attacks on secret exponents are typically bound to the leakage of single executions due to cryptographic protocols or side-channel countermeasures such as blinding. We propose for the first time, to use a well-established class of algorithms, i.e. unsupervised cluster classification algorithms such as...

2008
Pierre-Alain Fouque Denis Réal Frédéric Valette M'hamed Drissi

The aim of this paper is numerical and experimental study of the effects of flow hydraulics, pipe structure (particularly elastic behaviour) and submerged jet on leak behaviour. In this regard, experimental tests were performed on a high-pressure circulation set up. Experiments were performed on an old steel pipe and a High Density Polyethylene (HDPE) pipe discharged to the atmosphere in a wide...

2014
Guilherme Perin Laurent Imbert Lionel Torres Philippe Maurine

Countermeasures to defeat most of side-channel attacks on exponentiations are based on randomization of processed data. The exponent and the message blinding are particular techniques to thwart simple, collisions, differential and correlation analyses. Attacks based on a single (trace) execution of exponentiations, like horizontal correlation analysis and profiled template attacks, have shown t...

2007
Colin D. Walter

Side channel leakage from smart cards has been of concern since their inception and counter-measures are routinely employed. So a number of standard and reasonable assumptions are made here regarding an implementation of RSA in a cryptographic token which may be subjected to non-invasive side-channel cryptanalysis. These include blinding the re-usable secret key, input whitening, and using an e...

Journal: :IEEE Transactions on Information Theory 2022

We characterize the growth of Sibson and Arimoto mutual informations α-maximal leakage, any order that is at least unity, between a random variable growing set noisy, conditionally independent identically-distributed observations variable. Each these measures increases exponentially fast to limit order- measure-dependent, with an exponent measure-independent.

2010
Eike Kiltz Krzysztof Pietrzak

Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order to prevent multiple measurements of the same operation on different data, as such measurements might allow the adversary to learn the secret exponent. Several variants of blinding have been proposed in the literature...

2010
Eike Kiltz Krzysztof Pietrzak

Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order to prevent multiple measurements of the same operation on different data, as such measurements might allow the adversary to learn the secret exponent. Several variants of blinding have been proposed in the literature...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید