[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击ELECTRICAL AND ELECTRONICS ENGINEERING

Ö Demirci, ME SOLTEKIN - 2020 - itu.edu.tr
… intervention by using Advanced Encryption Standarts (AES) encryption methods for data … )
with verilog hardware design language (HDL). After the hardware implementation was run, the …

抗差分功耗分析和差分故障分析的AES 算法VLSI 设计与实现

韩军, 曾晓洋, 赵佳 - 通信学报, 2010 - infocomm-journal.com
… The main countermeasures employed in this hardware design are masking technique and
two-dimensional parity-based concurrent error detection method. And exploits such methods

[PDF][PDF] 基于汉明纠错编码的AES 硬件容错设计与实现

唐明, 张国平, 张焕国 - 电子学报, 2005 - ejournal.org.cn
… Abstract: We propose a fault tolerance AES hardware implementation to prevent attackers
from injecting faults in the process of AES design. The design adds Hamming Code error

如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… only half that time, as its successor, the Advanced Encryption Standard (AES [3]), has been
… standardization process and the round 2 candidates in the CACR public key cryptography

[HTML][HTML] 一种混合粒度奇偶校验故障注入检测方法

王沛晶, 刘强 - 2019 - html.rhhz.net
… 文献[7]对高级加密标准(Advanced Encryption Standard, AES)加密算法S盒采用基于自检测系统
的… 故障检测率理论值 Table 1 Fault coverage in theory of multi-granularity detection methods

[PDF][PDF] 密码产品的侧信道分析与评估

陈华, 习伟, 范丽敏, 焦志鹏, 冯婧怡 - 电子与信息学报, 2020 - jeit.ac.cn
… general than the attack test because they do not require the evaluator to go into the details
of the attack process and implementation. The general evaluation is to describe the degree of …

[PDF][PDF] Ⅲ. 大学院学位論文DISSERTATIONS

電気工学専攻 - ee.tu-tokyo.ac.jp
… Although there are no conventional power transfer shaft and differential gear, it is easy to
implement force control of those motored wheels directly through" by-wire" methods. Hence EV …

[PDF][PDF] 阁EasyChair Preprint

B Hurry - 2024 - easychair.org
… In summary, the interplay between BDA and ML fosters a collaborative ecosystem where …
Unlike traditional data analysis methods, BDA deals with datasets that are too vast, complex…

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

L AKÇAY - 2022 - polen.itu.edu.tr
… This study proposes suitable processor architectures for quantum-resistant Lattice-based
Cryptography algorithms in the final stage of the NIST standardization process. For this purpose…

[PDF][PDF] Efficient Built 丁in Self 丁Test for Video Coding Cores: A Case Study on Motion Estimation Computing Array

CL Hsu, YS Huang, CK Chen - scholar.archive.org
… The motion estimation process in any VCS comprises a search strategy to determine the …
On the other hand, the motion estimation also comprises a process to determine a matching …