Littérature scientifique sur le sujet « Code-based masking »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Code-based masking ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Code-based masking"
Xiao, Yisheng, Ruiyang Xu, Lijun Wu, Juntao Li, Tao Qin, Tie-Yan Liu et Min Zhang. « AMOM : Adaptive Masking over Masking for Conditional Masked Language Model ». Proceedings of the AAAI Conference on Artificial Intelligence 37, no 11 (26 juin 2023) : 13789–97. http://dx.doi.org/10.1609/aaai.v37i11.26615.
Texte intégralCarlet, Claude, Abderrahman Daif, Sylvain Guilley et Cédric Tavernier. « Quasi-linear masking against SCA and FIA, with cost amortization ». IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no 1 (4 décembre 2023) : 398–432. http://dx.doi.org/10.46586/tches.v2024.i1.398-432.
Texte intégralLevina, Alla, et Gleb Ryaskin. « Robust Code Constructions Based on Bent Functions and Spline Wavelet Decomposition ». Mathematics 10, no 18 (12 septembre 2022) : 3305. http://dx.doi.org/10.3390/math10183305.
Texte intégralWang, Weijia, Yu Yu et Francois-Xavier Standaert. « Provable Order Amplification for Code-Based Masking : How to Avoid Non-Linear Leakages Due to Masked Operations ». IEEE Transactions on Information Forensics and Security 14, no 11 (novembre 2019) : 3069–82. http://dx.doi.org/10.1109/tifs.2019.2912549.
Texte intégralGoy, Guillaume, Julien Maillard, Philippe Gaborit et Antoine Loiseau. « Single trace HQC shared key recovery with SASCA ». IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no 2 (12 mars 2024) : 64–87. http://dx.doi.org/10.46586/tches.v2024.i2.64-87.
Texte intégralYao, Xincheng, Chongyang Zhang, Ruoqi Li, Jun Sun et Zhenyu Liu. « One-for-All : Proposal Masked Cross-Class Anomaly Detection ». Proceedings of the AAAI Conference on Artificial Intelligence 37, no 4 (26 juin 2023) : 4792–800. http://dx.doi.org/10.1609/aaai.v37i4.25604.
Texte intégralBurke, Colin J., Patrick D. Aleo, Yu-Ching Chen, Xin Liu, John R. Peterson, Glenn H. Sembroski et Joshua Yao-Yu Lin. « Deblending and classifying astronomical sources with Mask R-CNN deep learning ». Monthly Notices of the Royal Astronomical Society 490, no 3 (10 octobre 2019) : 3952–65. http://dx.doi.org/10.1093/mnras/stz2845.
Texte intégralZhu, Fengmin, Michael Sammler, Rodolphe Lepigre, Derek Dreyer et Deepak Garg. « BFF : foundational and automated verification of bitfield-manipulating programs ». Proceedings of the ACM on Programming Languages 6, OOPSLA2 (31 octobre 2022) : 1613–38. http://dx.doi.org/10.1145/3563345.
Texte intégralChen, Ying, Rebekah Wu, James Felton, David M. Rocke et Anu Chakicherla. « A Method to Detect Differential Gene Expression in Cross-Species Hybridization Experiments at Gene and Probe Level ». Biomedical Informatics Insights 3 (janvier 2010) : BII.S3846. http://dx.doi.org/10.4137/bii.s3846.
Texte intégralHarrington, J. Patrick. « Polarized Continuum Radiation from Stellar Atmospheres ». Proceedings of the International Astronomical Union 10, S305 (décembre 2014) : 395–400. http://dx.doi.org/10.1017/s1743921315005116.
Texte intégralThèses sur le sujet "Code-based masking"
Cheng, Wei. « What can information guess ? : Towards information leakage quantification in side-channel analysis ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT044.
Texte intégralCryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital society. Such computations handle sensitive information like encryption keys, which are usually very exposed during manipulation, resulting in a huge threat to the security of the sensitive information concealed in cryptographic components. In the field of embedded systems security, side-channel analysis is one of the most powerful techniques against cryptographic implementations. The main subject of this thesis is the measurable side-channel security of cryptographic implementations, particularly in the presence of random masking. Overall, this thesis consists of two topics. One is the leakage quantification of the most general form of masking equipped with the linear codes, so-called code-based masking; the other one is exploration of applying more generic information measures in a context of side-channel analysis. Two topics are inherently connected to each other in assessing and enhancing the practical security of cryptographic implementations .Regarding the former, we propose a unified coding-theoretic framework for measuring the information leakage in code-based masking. Specifically, our framework builds formal connections between coding properties and leakage metrics in side-channel analysis. Those formal connections enable us to push forward the quantitative evaluation on how the linear codes can affect the concrete security of all code-based masking schemes. Moreover, relying on our framework, we consolidate code-based masking by providing the optimal linear codes in the sense of maximizing the side-channel resistance of the corresponding masking scheme. Our framework is finally verified by attack-based evaluation, where the attacks utilize maximum-likelihood based distinguishers and are therefore optimal. Regarding the latter, we present a full spectrum of application of alpha-information, a generalization of (Shannon) mutual information, for assessing side-channel security. In this thesis, we propose to utilize a more general information-theoretic measure, namely alpha-information (alpha-information) of order alpha. The new measure also gives the upper bound on success rate and the lower bound on the number of measurements. More importantly, with proper choices of alpha, alpha-information provides very tight bounds, in particular, when alpha approaches to positive infinity, the bounds will be exact. As a matter of fact, maximum-likelihood based distinguishers will converge to the bounds. Therefore, we demonstrate how the two world, information-theoretic measures (bounds) and maximum-likelihood based side-channel attacks, are seamlessly connected in side-channel analysis .In summary, our study in this thesis pushes forward the evaluation and consolidation of side-channel security of cryptographic implementations. From a protection perspective, we provide a best-practice guideline for the application of code-based masking. From an evaluation perspective, the application of alpha-information enables practical evaluators and designers to have a more accurate (or even exact) estimation of concrete side-channel security level of their cryptographic chips
Yang, Jheng Jhe, et 楊政哲. « Constructions of QC-LDPC Code Based on Masking and PDF ». Thesis, 2015. http://ndltd.ncl.edu.tw/handle/af2wa6.
Texte intégralChapitres de livres sur le sujet "Code-based masking"
Sim, Minho, Young-Jun Lee, Dongkun Lee, Jongwhoa Lee et Ho-Jin Choi. « A Simple Debiasing Framework for Out-of-Distribution Detection in Human Action Recognition ». Dans Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230511.
Texte intégralSantos, Ricardo Jorge, Jorge Bernardino et Marco Vieira. « Using Data Masking for Balancing Security and Performance in Data Warehousing ». Dans Handbook of Research on Computational Intelligence for Engineering, Science, and Business, 384–409. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2518-1.ch015.
Texte intégralActes de conférences sur le sujet "Code-based masking"
Zhang, Jiahe, Duo Li, Jun Jia, Wenjie Sun et Guangtao Zhai. « Protection and Hiding Algorithm of QR Code Based on Multi-channel Visual Masking ». Dans 2019 IEEE Visual Communications and Image Processing (VCIP). IEEE, 2019. http://dx.doi.org/10.1109/vcip47243.2019.8966044.
Texte intégralChen, Yinda, Wei Huang, Shenglong Zhou, Qi Chen et Zhiwei Xiong. « Self-Supervised Neuron Segmentation with Multi-Agent Reinforcement Learning ». Dans Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California : International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/68.
Texte intégralNiu, Runliang, Zhepei Wei, Yan Wang et Qi Wang. « AttExplainer : Explain Transformer via Attention by Reinforcement Learning ». Dans Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California : International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/102.
Texte intégralZhou, Min, Chenchen Xu, Ye Ma, Tiezheng Ge, Yuning Jiang et Weiwei Xu. « Composition-aware Graphic Layout GAN for Visual-Textual Presentation Designs ». Dans Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California : International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/692.
Texte intégral