咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理

主题

  • 3 篇 present algorith...
  • 1 篇 novikov explicit
  • 1 篇 cache timing att...
  • 1 篇 algorithm's mast...
  • 1 篇 strongly non-uni...
  • 1 篇 radon transform
  • 1 篇 inverse problems
  • 1 篇 tretiak–metz
  • 1 篇 asic and fpga
  • 1 篇 s-box
  • 1 篇 side-channel att...
  • 1 篇 iot hardware sec...
  • 1 篇 computed tomogra...
  • 1 篇 inversion formul...
  • 1 篇 spect
  • 1 篇 backprojection
  • 1 篇 radionuclide dis...
  • 1 篇 .reconstruction ...
  • 1 篇 encryption/decry...

机构

  • 1 篇 amer univ cairo ...
  • 1 篇 mentor cairo
  • 1 篇 shiv nadar unive...
  • 1 篇 univ sci & techn...
  • 1 篇 caltech acm pasa...

作者

  • 1 篇 salah khaled
  • 1 篇 kunyansky la
  • 1 篇 hemeda mostafa
  • 1 篇 dhyaneswaran t.
  • 1 篇 zaky ahmed
  • 1 篇 elmitwalli eslam
  • 1 篇 harshitha r.s.
  • 1 篇 ismail yehea
  • 1 篇 amsaprabhaa m.

语言

  • 2 篇 其他
  • 1 篇 英文
检索条件"主题词=Present algorithm"
3 条 记 录,以下是1-10 订阅
排序:
Efficient Cache Timing Attack on the present algorithm for Master Key Recovery
Efficient Cache Timing Attack on the Present Algorithm for M...
收藏 引用
2023 IEEE Global Conference on Information Technologies and Communications, GCITC 2023
作者: Amsaprabhaa, M. Dhyaneswaran, T. Harshitha, R.S. Shiv Nadar University School of Engineering Dept. Computer Science and Engineering Chennai India
Conventional side-channel attacks have limitations, like being inefficient, facing considerable challenges in gathering and injecting fault data in real-world scenarios, and having limited practicality. In recent year... 详细信息
来源: 评论
Ultra Low-Power Encryption/Decryption Core for Lightweight IoT Applications  15
Ultra Low-Power Encryption/Decryption Core for Lightweight I...
收藏 引用
15th International Computer Engineering Conference (ICENCO)
作者: Zaky, Ahmed Elmitwalli, Eslam Hemeda, Mostafa Ismail, Yehea Salah, Khaled Univ Sci & Technol Zewail City Nanotechnol Engn Dept October Gardens Egypt Amer Univ Cairo Ctr Nanoelect & Devices CND Zewail Egypt Mentor Cairo Egypt
The fact that security is not the main functionality of an IoT device means that even lesser portion of its computing power is available for security. Security measures implemented in traditional computers such as cry... 详细信息
来源: 评论
A new SPECT reconstruction algorithm based on the Novikov explicit inversion formula
收藏 引用
INVERSE PROBLEMS 2001年 第2期17卷 293-306页
作者: Kunyansky, LA CALTECH ACM Pasadena CA 91125 USA
We present a new reconstruction algorithm for single-photon emission computed tomography. The algorithm is based on the Novikov explicit inversion formula for the attenuated Radon transform with non-uniform attenuatio... 详细信息
来源: 评论