نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

Journal: :IEEE Transactions on Information Forensics and Security 2021

This study investigates a new side-channel leakage observed in the inner rounds of an unrolled hardware implementation block ciphers chosen-input attack scenario. The occurs first round and it can be later because arises from path activation bias caused by difference between two consecutive inputs. Therefore, that exploits is possible even for implementations equipped with countermeasures (mask...

2010
Mathilde DUCLOS

1 Background 2 1.1 Characterization of Anonymous Channel Based on Indistinguishability . . . . . . . . . . . . 2 1.1.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Relations Proven . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 A Provably Secure And Efficient Countermeasure Against Timing Attacks . . . . . . . ...

Journal: :journal of rehabilitation in civil engineerin 0
mostafa sadeghnejad ph.d. candidate, faculty of civil engineering, semnan university, semnan, iran. gholamali shafabakhsh professor, faculty of civil engineering, semnan university, semnan, iran.

asphalt modification/reinforcement has received considerable attention as viable solutions to enhance flexible pavement performance. this is mainly prompted by the unsatisfactory performance of traditional road materials exposed to dramatic increases and changes in traffic patterns. this paper presents the evaluation of fatigue behaviour of nano reinforced stone mastic asphalt mixtures. fatigue...

Journal: :journal of biomedical physics and engineering 0
s. khosravani master student of biomedical engineering, amirkabir university of technology (tehran polytechnic) a. maleki assisstant professor, department of electrical and computer engineering, semnan university a. fallah assisstant professor, department of biomedical engineering, amirkabir university of technology (tehran polytechic)

background: muscle fatigue is an important issue in neuromuscular rehabilitation. better control of this phenomenon would result in better prevention of its consequent physiological damages. objective: to provide a mathematical representation of muscle fatigue as a function of time. methods: we conducted this study by combining the emg-based estimation methods of muscle activation with the avai...

Journal: :iranian rehabilitation journal 0
marzieh heidari mirdamad blv, madar sq, madadkaran. seyed massood nabavi felestin squre, italia street, shahid mostafa khomeini hospital, tehran, iran. malahat akbarfahimi mirdamad blv, madar sq- madadkaran. masoud salehi department of statistics and mathematics, school of rehabilitation sciences, iran university of medical sciences, mother street, shah nazari street, nezam street, tehran, iran. mohammad torabi-nami neuroscience, school of advanced medical science and technologies, shiraz university of medical sciences, shiraz, iran.

objectives: this study was designed to evaluate the psychometric features of the persian version of the fatigue impact scale (fis-p) tool when used in iranian ms patients. methods: 140 ms patients and the equivalent number of healthy controls completed the following assessments: fis-p, fatigue severity scale (fss), sf-36 questionnaire and  the mini-mental state examination (mmse).  results: a s...

Journal: :IACR Cryptology ePrint Archive 2012
François Durvaux Mathieu Renauld François-Xavier Standaert Loïc van Oldeneel tot Oldenzeel Nicolas Veyrat-Charvillon

Inserting random delays in cryptographic implementations is often used as a countermeasure against side-channel attacks. Most previous works on the topic focus on improving the statistical distribution of these delays. For example, efficient random delay generation algorithms have been proposed at CHES 2009/2010. These solutions increase security against attacks that solve the lack of synchroni...

2013
Amir Moradi Oliver Mischke

Because of the isomorphisms in GF(2) there exist 240 different non-trivial dual ciphers of AES. While keeping the inand outputs of a dual cipher equal to the original AES, all the intermediate values and operations can be different from that of the original one. A comprehensive list of these dual ciphers is given by an article presented at ASIACRYPT 2002, where it is mentioned that they might b...

Journal: :IACR Cryptology ePrint Archive 2015
Alexandre Duc Sebastian Faust François-Xavier Standaert

We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In p...

2003
Keith K. Knapp

During the last two years an extensive review of deer-vehicle crash (DVC) countermeasure documentation has been completed. Research and/or documents related to 16 different countermeasures were reviewed and are currently being summarized in a DVC Countermeasures Toolbox. An example of some of the countermeasure research reviewed includes documents related to deer whistles, warning signs and tec...

2012
Nansai Hu

Cognitive radio (CR) has been an active research topic in wireless communications. In this dissertation, radio behavior and potential security threats in cognitive radio networks are investigated in order to successfully deploy CR networks and realize its benefits. We study complex CR misuse issues during its secondary access processes, including misbehavior, cheating, and attack. Different cou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید