نتایج جستجو برای: anastomostic leakage

تعداد نتایج: 30781  

Journal: :IEEE Trans. VLSI Syst. 2011
Hao Xu Wen-Ben Jone Ranga Vemuri

The increasing leakage power consumption and stringent thermal constraint necessitate more aggressive leakage control techniques. Power gating and body biasing are widely used for standby leakage control. Their large energy overhead for performing mode transition is the major obstacle for more aggressive leakage control. Temperature and process variation (TV/PV) further magnify the overhead pro...

2015
Wang Xin-hua

With the heater pipeline leakage experiment conducted on the experiment table, inner pipeline leakage of heater was studied through the leakage failure detection system. The frequency distribution and the amplitude of acoustic emission signals of leakage versus internal pressure were analyzed. Variations of signals versus leakage aperture and dissemination distance were summarized. According to...

2012
Sandip A. Kale

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

Journal: :IACR Cryptology ePrint Archive 2014
Janaka Alawatugoda Colin Boyd Douglas Stebila

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets...

Journal: :IEICE Transactions 2015
Eiichiro Fujisaki Akinori Kawachi Ryo Nishimaki Keisuke Tanaka Kenji Yasunaga

Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...

2014
Bingchun Yang Shaoyi Sun Xueyuan Peng Bei Guo Ziwen Xing

A rotary vane expander has been developed to replace the throttling valve for improving the COP of transcritical CO2 refrigeration system. Due to the serious internal leakage, the expander efficiency is not satisfactory. This paper presents the theoretical and experimental investigation on the internal leakage in a rotary vane expander prototype. Firstly, the leakage flow rate through the inter...

Journal: :IACR Cryptology ePrint Archive 2014
Alexandre Duc Stefan Dziembowski Sebastian Faust

A recent trend in cryptography is to formally show the leakage resilience of cryptographic implementations in a given leakage model. One of the most prominent leakage models – the so-called bounded leakage model – assumes that the amount of leakage is a-priori bounded. Unfortunately, it has been pointed out that the assumption of bounded leakages is hard to verify in practice. A more realistic ...

2011
Zvika Brakerski Yael Tauman Kalai

A leakage resilient encryption scheme is one which stays secure even against an attacker that obtains a bounded amount of side information on the secret key (say λ bits of “leakage”). A fundamental question is whether parallel repetition amplifies leakage resilience. Namely, if we secret share our message, and encrypt the shares under two independent keys, will the resulting scheme be resilient...

2017
A. Adam Ding Liwei Zhang François Durvaux François-Xavier Standaert Yunsi Fei

Evaluation of side channel leakage for the embedded crypto systems requires sound leakage detection procedures. We relate the test vector leakage assessment (TVLA) procedure to the statistical minimum p-value (mini-p) procedure, and propose a sound method of deciding leakage existence in the statistical hypothesis setting. To improve detection, an advanced statistical procedure Higher Criticism...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید