نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

2011
Qian Jiang Yonghong Zhang

From many aspects such as the resource construction, the talent group, and the mechanism and system, main factors to restrain the development of college library are analyzed, and corresponding countermeasures are proposed in this article.

2015
Srdjan Pudar Daji Qiao Hridesh Rajan

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix CHAPTER

Journal: :IACR Cryptology ePrint Archive 2017
Naina Gupta Arpan Jati Anupam Chattopadhyay Somitra Kumar Sanadhya Donghoon Chang

Threshold Implementation (TI) is one of the most widely used countermeasure for side channel attacks. Over the years several TI techniques have been proposed for randomizing cipher execution using different variations of secret-sharing and implementation techniques. For instance, Direct Sharing (4-shares) is the most straightforward implementation of the threshold countermeasure. But, its usage...

2004
Hideyo Mamiya Atsuko Miyaji Hiroaki Morimoto

In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel attacks monitor power consumption and even exploit the leakage information related to power consumption to reveal bits of a secret key d although d is hidden inside a smart card. Almost public key cryptosystems includi...

Journal: :IEEE Access 2022

This paper identifies vulnerabilities to recently proposed countermeasures leakage power analysis attacks in FDSOI systems based on the application of a random body bias. The are analyzed and relative difficulty obtain secret key, once taken into account, compared original proposals. A new countermeasure, bias scheme, is then proposed. countermeasure equalization asymmetries static consumption ...

2016
Hidehiko Sekiya Takeshi Kinomoto Chitoshi Miki

To implement steel bridge maintenance, especially that related to fatigue damage, it is important to monitor bridge deformations under traffic conditions. Bridges deform and rotate differently under traffic load conditions because their structures differ in terms of length and flexibility. Such monitoring enables the identification of the cause of stress concentrations that cause fatigue damage...

Journal: :Radiation and environmental biophysics 2000
N M Crout N A Beresford R W Mayes P J MacEachern C L Barnett C S Lamb B J Howard

Previously reported models for radioiodine in ruminants cannot account for the effect of variations in stable iodine intake including large countermeasure doses of stable iodine on the transfer of radioiodine to goat milk. A metabolically based model of radioiodine transfer in goats has been parameterised using new experimental data on the effect of countermeasure doses of stable iodine on radi...

Journal: :IACR Cryptology ePrint Archive 2015
Pierre-Alain Fouque Sylvain Guilley Cédric Murdica David Naccache

ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Cryptography (ecc) against Simple Power Analysis, many countermeasures have been proposed. Doubling and Additions of points on the given elliptic curve require several additions and multiplications in the base field and th...

Journal: :Journal of Cryptographic Engineering 2023

Abstract Deep-learning side-channel attacks, applying deep neural networks to are known that can easily attack some existing countermeasures such as masking and random jitter. While there have been many studies on profiled deep-learning a new approach involves learning non-profiled attacks was proposed in 2018. In our study, we investigate the structure of multi-layer perceptrons points interes...

Journal: :IEEE Transactions on Communications 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید