Leakages from devices of CATV system

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function

Yoneyama et al. introduced Leaky Random Oracle Model (LROM for short) at ProvSec2008 in order to discuss security (or insecurity) of cryptographic schemes which use hash functions as building blocks when leakages from pairs of input and output of hash functions occur. This kind of leakages occurs due to various attacks caused by sloppy usage or implementation. Their results showed that this kin...

متن کامل

Improvement of the CATV Coaxial Distribution System Parameters

The paper deals with coaxial part of HFC CATV system. System parameters determinative in obtaining the desired signal level, carrier-to-noise ratio and acceptable nonlinear distortions are considered. Formulae for the gain and the maximum number of RF amplifiers in the longest coaxial link are developed. A mathematical model of the return path channel is suggested with the noise-funneling effec...

متن کامل

Improvement Scheme for Directly Modulated Fiber Optical CATV System Performances

In an optical CATV system, the signal was directly or externally modulated with lightwave before communicates. Directly modulating signal with LD is an economic method, but the transmission distance and performance are significantly limited by laser chirping issues. In another hand, the externally modulation schemes have been proofed to provide better outcomes by eliminating the laser chirping ...

متن کامل

Detecting Hidden Leakages

Reducing the entropy of the mask is a technique which has been proposed to mitigate the high performance overhead of masked software implementations of symmetric block ciphers. Rotating S-box Masking (RSM) is an example of such schemes applied to AES with the purpose of maintaining the security at least against univariate first-order side-channel attacks. This article examines the vulnerability...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC-PapersOnLine

سال: 2018

ISSN: 2405-8963

DOI: 10.1016/j.ifacol.2018.07.108