نتایج جستجو برای: xor

تعداد نتایج: 2663  

1993
Andisheh Sarabi Marek A. Perkowski

AND XOR networks include all realizations of switching functions in two and multi level which in clude AND XOR and inverters as basic building blocks It has been shown that for many AND XOR canonical networks and trees the test set to detect stuck at faults and bridging faults are independent of the function being realized This paper provides a survey of these studies and introduces certain res...

Journal: :CoRR 2015
Jayanta Kumar Das Pabitra Pal Choudhury Sudhakar Sahoo

CVT and XOR are two binary operations together used to calculate the sum of two non-negative integers on using a recursive mechanism. In this present study the convergence behaviors of this recursive mechanism has been captured through a tree like structure named as CVT-XOR Tree. We have analyzed how to identify the parent nodes, leaf nodes and internal nodes in the CVT-XOR Tree. We also provid...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2017
Arkadev Chattopadhyay Nikhil S. Mande

We show a new duality between the polynomial margin complexity of f and the discrepancy of the function f ◦XOR, called an XOR function. Using this duality, we develop polynomial based techniques for understanding the bounded error (BPP) and the weakly-unbounded error (PP) communication complexities of XOR functions. This enables us to show the following. • A weak form of an interesting conjectu...

Journal: :Circulation research 2004
Toshio Ohtsubo Ilsa I Rovira Matthew F Starost Chengyu Liu Toren Finkel

Xanthine oxidoreductase (XOR) is the enzyme responsible for the final step in purine degradation resulting in the generation of uric acid. Here we have generated mice deficient in XOR. As expected, these animals lack tissue XOR activity and have low to undetectable serum levels of uric acid. Although normal at birth, XOR-/- mice fail to thrive after 10 to 14 days, and most die within the first ...

2011
Hayoung Oh Junjie Lee Suchul Lee Chong-Kwon Kim

Network coding is a promising technology that increases the system throughput via reducing the number of transmissions for the packets delivered from the source node to the destination node in the saturated traffic scenario. Nevertheless, some packets can suffer from the metric of end-to-end delay. Since it takes the queuing delay in the intermediate node to wait for other packets to be encoded...

Journal: :IACR Cryptology ePrint Archive 2017
Phuong Ha Nguyen Durga Prasad Sahoo Chenglu Jin Kaleel Mahmood Marten van Dijk

Silicon Physical Unclonable Functions (PUFs) have been proposed as an emerging hardware security primitive in various security applications such as device identification, authentication, and cryptographic key generation. Current so-called ‘strong’ PUFs, which allow a large challenge response space, are compositions of Arbiter PUFs (APUFs), e.g. the x-XOR APUF. Wide scale deployment of state-oft...

2014
Vladimir Kolesnikov Payman Mohassel Mike Rosulek

Most implementations of Yao’s garbled circuit approach for 2-party secure computation use the free-XOR optimization of Kolesnikov & Schneider (ICALP 2008). We introduce an alternative technique called flexible-XOR (fleXOR) that generalizes free-XOR and offers several advantages. First, fleXOR can be instantiated under a weaker hardness assumption on the underlying cipher/hash function (related-...

2011
Alexander Nadel

This document is an addendum to [1]. We complement Section 4 of [1] in two ways. First, a detailed analysis of the randomized algorithms is provided. Second, an explanation of the behavior of the quality functions of pguide and pbcpguide 100 is proposed. The reader should be familiar with the content of [1] up to and including Section 4. 1 Analyzing Randomized Algorithms This section complement...

Journal: :Системи управління, навігації та зв’язку. Збірник наукових праць 2021

2017
Sumanta Sarkar Habeeb Syed

This work considers the problem of constructing efficient MDS matrices over the field F2m . Efficiency is measured by the metric XOR count which was introduced by Khoo et al. in CHES 2014. Recently Sarkar and Syed (ToSC Vol. 1, 2016) have shown the existence of 4 × 4 Toeplitz MDS matrices with optimal XOR counts. In this paper, we present some characterizations of Toeplitz matrices in light of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید