>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到SCA相关记录19条 . 查询时间(0.078 秒)
Crossbreeding of the elite clones is an important strategy to breed the new germplasms of Camellia oleifera capable of higher oil yield and quality. While the genetic control model and heterosis of oi...
中国散裂中子源(CSNS)反角白光中子束线(Back-n)对中子核数据测量和核技术应用等多个领域均有重要意义。为监测其中子束斑轮廓、束流密度及束流能量,研制了由镀硼微网格气体(Micromegas)探测器构成的束流剖面监测装置,并通过测量中子的飞行时间(TOF)来获得能量信息。
Many crypto-algorithms, Deep-Learning, DSP compute on words larger than 8-bit. SCA attacks can easily be done on Boolean operations like XOR, AND, OR, and substitution operations like s-box, p-box or ...
In recent years, deep learning has become an attractive ingredient to side-channel analysis (SCA) due to its potential to improve the success probability or enhance the performance of certain frequent...
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Side Channel Attacks (SCA) and Fault Injection Attacks (FIA) allow an opponent to have partial access to the internal behavior of the hardware. Since the end of the nineties, many works have shown tha...
Since the advent of Differential Power Analysis (DPA) in the late 1990s protecting embedded devices against Side-Channel Analysis (SCA) attacks has been a major research effort. Even though many diffe...
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitc...
Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains ac- cess of a profiling device to build a precise model which is used to...
Analysis Of Variance and CPA in SCA     SCA  AOV  CPA       2016/1/7
This paper introduces Side-Channel Analysis results obtained on an unprotected circuit characterized by a surprisingly non-linear leakage. While in such a case, Correlation Power Analysis is not adapt...
PHOTON is a lightweight hash function which was proposed by Guo et al. in CRYPTO 2011. This is used in low-resource ubiquitous computing devices such as RFID tags, wireless sensor nodes, smart cards...
异构和集成是长期困扰DNC系统的两大难题,服务组件架构(Service Component Architecture,简记SCA)为解决这两大难题提供了良好的技术规范和解决方案.通过参考各种文献和商业DNC系统,归纳出了DNC系统的主要业务功能,并在此基础上,提出了基于SCA规范的DNC系统模型,模型分为四层:向其它应用提供服务接口的应用层、提供业务功能服务的服务层、为服务提供构件的组合件层、为构...
针对传统遗留系统在面向服务计算移植过程中存在的重复性和多样性问题,提出一种基于服务组件框架(SCA)的遗留系统移植方案,将遗留系统移植到SCA组件系统中,通过python扩展生成器生成可以被该脚本调用的模块,在硬件平台上进行模拟,实验结果表明,该方案是可行的,能够避免因面向服务实现形式的差异而造成的重复移植。
目的: 研究急性肾衰竭(ARF)对胎肝Sca-1+细胞向肾组织细胞分化频率的影响。 方法: 用磁性细胞分选(MACS)和PCR技术分离、鉴定小鼠雄性胎肝Sca-1+细胞;将2×104的雄性胎肝Sca-1+细胞输注给致死量射线照射([60Co],8 Gy)的同系雌性小鼠体内;8周后,将受体小鼠随机分为A、B和C 3组(A组:单纯辐射;B组:ARF和C组:ARF-Sca-1+),用50%(V/V)的甘...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...