نتایج جستجو برای: correlated side information

تعداد نتایج: 1567149  

Journal: :IACR Cryptology ePrint Archive 2017
Laszlo Hars

A new concept, the Bit-Mixer is introduced. It is a function of fixed, possibly different size of input and output, which computes statistically uncorrelated output from correlated input values, and its behavior is altered by parameters, called keys. Several constructions are presented, with very fast, power efficient implementations in electronic hardware, having very little side channel leaka...

2016
Henri Pirkkalainen Markus Salo

Despite its benefits, information technology (IT) use is associated with serious negative effects on individuals. For example, technostress and IT addiction can harm IT users’ organizational performance and everyday well-being. Such dark side phenomena have become more evident since IT has transmuted into a major component of humans’ job routines and private lives. However, since current inform...

Journal: :international journal of electrical and electronics engineering 0
saber meymanatabadi javad musevi niya behzad mozaffari tazehkand

orthogonal frequency division multiplexing (ofdm) has become a promising method for many wireless communication applications. however, one main drawback of ofdm systems is the high peak-to-average power ratio (papr). selected mapping (slm) is a well-known technique to decrease the problem of high papr in ofdm systems. in this method, transmitter is obliged to send some bits named side informati...

2002
Bodo Möller

We present a new 2-ary elliptic curve point multiplication method with resistance against side-channel attacks. This method provides two advantages compared with previous similar side-channel attack countermeasures: It avoids a fixed table, thus reducing potential information leakage available to adversaries; and it is easily parallelizable on two-processor systems, where it provides much impro...

Journal: :IEEE Transactions on Information Theory 2021

We study the role of coded side information in single-server Private Information Retrieval (PIR). An instance PIR problem includes a server that stores database K independently and uniformly distributed messages, user who wants to retrieve one these messages from server. consider settings which initially has access linear combination subset M database. assume identities form support set as well...

2012
Jeffrey Wall Lakshmi S. Iyer

This paper presents a conceptual model to explain employee security behaviors as a function of manager’s transgressions in the workplace. To date, most information systems security (ISS) studies neglect the effects poor leadership can have on the security of organizational ISS. This paper seeks to broaden the study of leadership in information systems security by examining negative effects of l...

Journal: :CoRR 2015
Nima S. Anzabi-Nezhad Ghosheh Abed Hodtani Mohammad Molavi Kakhki

In this paper, a new and general version of Gaussian channel in presence of two-sided state information correlated to the channel input and noise is considered. Determining a general achievable rate for the channel and obtaining the capacity in a non-limiting case, we try to analyze and solve the Gaussian version of the Cover-Chiang theorem -as an open problemmathematically and information-theo...

The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید