نتایج جستجو برای: dfa

تعداد نتایج: 2483  

2011
Mohamed Saied Emam Mohamed Stanislav Bulygin Johannes Buchmann

Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular, algebraic methods in side channel and differential fault analysis (DFA) attracted a lot of attention recently. In [13], Hojśık and Rudolf used DFA to recover the inner state of the stream cipher Trivium which leads to recovering the secret key. For this attack, they r...

Journal: :IEICE Electronic Express 2011
Masahiro Kaminaga Arimitsu Shikoda Hideki Yoshikawa

Recently, various studies of attack methods of round reduction differential fault analysis (DFA) using fault injection in block cipher-implemented microcontrollers have been reported. However, few studies have focused on the quantitative evaluation method of round reduction DFA vulnerability using detailed fault injection timing dependency of attack success rate. This is required to improve mic...

2005
A. N. Trahtman

A word w is called a synchronizing (recurrent, reset, directable) word of a deterministic finite automaton (DFA) if w brings all states of the automaton to some specific state; a DFA that has a synchronizing word is said to be synchronizable. Černý conjectured in 1964 that every n-state synchronizable DFA possesses a synchronizing word of length at most (n−1). We consider automata with aperiodi...

Journal: :Discrete Mathematics & Theoretical Computer Science 2007
Avraham Trakhtman

A word w is called a synchronizing (recurrent, reset, directable) word of a deterministic finite automaton (DFA) if w brings all states of the automaton to some specific state; a DFA that has a synchronizing word is said to be synchronizable. Černý conjectured in 1964 that every n-state synchronizable DFA possesses a synchronizing word of length at most (n−1). We consider automata with aperiodi...

2001
Jaakko Särelä Harri Valpola Ricardo Vigário Erkki Oja

Dynamical factor analysis (DFA) is a generative dynamical algorithm, with linear mapping from factors to the observations and nonlinear mapping of the factor dynamics. The latter is modeled by a multilayer perceptron. Ensemble learning is used to estimate the DFA model in an unsupervised manner. The performance of the DFA have been tested in a set of artificially generated noisy modulated sinus...

2004
Robert A. van Engelen

This paper presents a new XML parsing method based on deterministic finite state automata (DFA). A DFA generator is described that automatically translates XML Schemas to DFAs for efficient parsing of XML documents and SOAP/XML messages. The DFA-based parsing approach supports the implementation of high-performance Web services. Two example case studies are described and performance results are...

2009
Jan W. Kantelhardt

5 Methods for Non-Stationary Fractal Time-Series Analysis 15 5.1 Wavelet Analysis . . . . . . . . . . . . . . . . . . . . . . . . . 15 5.2 Discrete Wavelet Transform (WT) Approach . . . . . . . . . . 16 5.3 Detrended Fluctuation Analysis (DFA) . . . . . . . . . . . . . 16 5.4 Detection of Trends and Crossovers with DFA . . . . . . . . . 19 5.5 Sign and Magnitude (Volatility) DFA . . . . . . . ....

Journal: :American journal of physiology. Heart and circulatory physiology 2002
Itay Perlstein Nir Sapir Joshua Backon Dan Sapoznikov Roman Karasik Shlomo Havlin Amnon Hoffman

We studied heart rate variability in rats by power scaling spectral analysis (PSSA), autoregressive modeling (AR), and detrended fluctuation analysis (DFA), assessed stability by coefficient of variation between consecutive 6-h epochs, and then compared cross-correlation among techniques. These same parameters were checked from baseline conditions through acute and chronic disease states (strep...

2011
Mohamed Saied Emam Mohamed Stanislav Bulygin Johannes A. Buchmann

Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular, algebraic methods in side channel and differential fault analysis (DFA) attracted a lot of attention recently. In [9], Hojśik and Rudolf used DFA to recover the inner state of the stream cipher Trivium which leads to recovering the secret key. For this attack, they re...

Journal: :Journal of clinical microbiology 2005
Daniel P Fedorko Jeanne C Preuss Gary A Fahle Li Li Steven H Fischer Patricia Hohman Jeffrey I Cohen

We analyzed a shell vial culture assay (SVA), real-time PCR, and a direct fluorescent antibody assay (DFA) for rapid detection of vaccinia virus from vaccination sites of Dryvax vaccine recipients. Of 47 samples assayed, 100% were positive by PCR, 89% were positive by SVA, and 40% were positive by DFA. DFA was limited by the need for adequate numbers of cells, with 32% of samples inadequate for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید