Gotowa bibliografia na temat „Code-based masking”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Code-based masking”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Code-based masking"
Xiao, Yisheng, Ruiyang Xu, Lijun Wu, Juntao Li, Tao Qin, Tie-Yan Liu i Min Zhang. "AMOM: Adaptive Masking over Masking for Conditional Masked Language Model". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 11 (26.06.2023): 13789–97. http://dx.doi.org/10.1609/aaai.v37i11.26615.
Pełny tekst źródłaCarlet, Claude, Abderrahman Daif, Sylvain Guilley i Cédric Tavernier. "Quasi-linear masking against SCA and FIA, with cost amortization". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 1 (4.12.2023): 398–432. http://dx.doi.org/10.46586/tches.v2024.i1.398-432.
Pełny tekst źródłaLevina, Alla, i Gleb Ryaskin. "Robust Code Constructions Based on Bent Functions and Spline Wavelet Decomposition". Mathematics 10, nr 18 (12.09.2022): 3305. http://dx.doi.org/10.3390/math10183305.
Pełny tekst źródłaWang, Weijia, Yu Yu i Francois-Xavier Standaert. "Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations". IEEE Transactions on Information Forensics and Security 14, nr 11 (listopad 2019): 3069–82. http://dx.doi.org/10.1109/tifs.2019.2912549.
Pełny tekst źródłaGoy, Guillaume, Julien Maillard, Philippe Gaborit i Antoine Loiseau. "Single trace HQC shared key recovery with SASCA". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 64–87. http://dx.doi.org/10.46586/tches.v2024.i2.64-87.
Pełny tekst źródłaYao, Xincheng, Chongyang Zhang, Ruoqi Li, Jun Sun i Zhenyu Liu. "One-for-All: Proposal Masked Cross-Class Anomaly Detection". Proceedings of the AAAI Conference on Artificial Intelligence 37, nr 4 (26.06.2023): 4792–800. http://dx.doi.org/10.1609/aaai.v37i4.25604.
Pełny tekst źródłaBurke, Colin J., Patrick D. Aleo, Yu-Ching Chen, Xin Liu, John R. Peterson, Glenn H. Sembroski i Joshua Yao-Yu Lin. "Deblending and classifying astronomical sources with Mask R-CNN deep learning". Monthly Notices of the Royal Astronomical Society 490, nr 3 (10.10.2019): 3952–65. http://dx.doi.org/10.1093/mnras/stz2845.
Pełny tekst źródłaZhu, Fengmin, Michael Sammler, Rodolphe Lepigre, Derek Dreyer i Deepak Garg. "BFF: foundational and automated verification of bitfield-manipulating programs". Proceedings of the ACM on Programming Languages 6, OOPSLA2 (31.10.2022): 1613–38. http://dx.doi.org/10.1145/3563345.
Pełny tekst źródłaChen, Ying, Rebekah Wu, James Felton, David M. Rocke i Anu Chakicherla. "A Method to Detect Differential Gene Expression in Cross-Species Hybridization Experiments at Gene and Probe Level". Biomedical Informatics Insights 3 (styczeń 2010): BII.S3846. http://dx.doi.org/10.4137/bii.s3846.
Pełny tekst źródłaHarrington, J. Patrick. "Polarized Continuum Radiation from Stellar Atmospheres". Proceedings of the International Astronomical Union 10, S305 (grudzień 2014): 395–400. http://dx.doi.org/10.1017/s1743921315005116.
Pełny tekst źródłaRozprawy doktorskie na temat "Code-based masking"
Cheng, Wei. "What can information guess ? : Towards information leakage quantification in side-channel analysis". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT044.
Pełny tekst źródłaCryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital society. Such computations handle sensitive information like encryption keys, which are usually very exposed during manipulation, resulting in a huge threat to the security of the sensitive information concealed in cryptographic components. In the field of embedded systems security, side-channel analysis is one of the most powerful techniques against cryptographic implementations. The main subject of this thesis is the measurable side-channel security of cryptographic implementations, particularly in the presence of random masking. Overall, this thesis consists of two topics. One is the leakage quantification of the most general form of masking equipped with the linear codes, so-called code-based masking; the other one is exploration of applying more generic information measures in a context of side-channel analysis. Two topics are inherently connected to each other in assessing and enhancing the practical security of cryptographic implementations .Regarding the former, we propose a unified coding-theoretic framework for measuring the information leakage in code-based masking. Specifically, our framework builds formal connections between coding properties and leakage metrics in side-channel analysis. Those formal connections enable us to push forward the quantitative evaluation on how the linear codes can affect the concrete security of all code-based masking schemes. Moreover, relying on our framework, we consolidate code-based masking by providing the optimal linear codes in the sense of maximizing the side-channel resistance of the corresponding masking scheme. Our framework is finally verified by attack-based evaluation, where the attacks utilize maximum-likelihood based distinguishers and are therefore optimal. Regarding the latter, we present a full spectrum of application of alpha-information, a generalization of (Shannon) mutual information, for assessing side-channel security. In this thesis, we propose to utilize a more general information-theoretic measure, namely alpha-information (alpha-information) of order alpha. The new measure also gives the upper bound on success rate and the lower bound on the number of measurements. More importantly, with proper choices of alpha, alpha-information provides very tight bounds, in particular, when alpha approaches to positive infinity, the bounds will be exact. As a matter of fact, maximum-likelihood based distinguishers will converge to the bounds. Therefore, we demonstrate how the two world, information-theoretic measures (bounds) and maximum-likelihood based side-channel attacks, are seamlessly connected in side-channel analysis .In summary, our study in this thesis pushes forward the evaluation and consolidation of side-channel security of cryptographic implementations. From a protection perspective, we provide a best-practice guideline for the application of code-based masking. From an evaluation perspective, the application of alpha-information enables practical evaluators and designers to have a more accurate (or even exact) estimation of concrete side-channel security level of their cryptographic chips
Yang, Jheng Jhe, i 楊政哲. "Constructions of QC-LDPC Code Based on Masking and PDF". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/af2wa6.
Pełny tekst źródłaCzęści książek na temat "Code-based masking"
Sim, Minho, Young-Jun Lee, Dongkun Lee, Jongwhoa Lee i Ho-Jin Choi. "A Simple Debiasing Framework for Out-of-Distribution Detection in Human Action Recognition". W Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230511.
Pełny tekst źródłaSantos, Ricardo Jorge, Jorge Bernardino i Marco Vieira. "Using Data Masking for Balancing Security and Performance in Data Warehousing". W Handbook of Research on Computational Intelligence for Engineering, Science, and Business, 384–409. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2518-1.ch015.
Pełny tekst źródłaStreszczenia konferencji na temat "Code-based masking"
Zhang, Jiahe, Duo Li, Jun Jia, Wenjie Sun i Guangtao Zhai. "Protection and Hiding Algorithm of QR Code Based on Multi-channel Visual Masking". W 2019 IEEE Visual Communications and Image Processing (VCIP). IEEE, 2019. http://dx.doi.org/10.1109/vcip47243.2019.8966044.
Pełny tekst źródłaChen, Yinda, Wei Huang, Shenglong Zhou, Qi Chen i Zhiwei Xiong. "Self-Supervised Neuron Segmentation with Multi-Agent Reinforcement Learning". W Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/68.
Pełny tekst źródłaNiu, Runliang, Zhepei Wei, Yan Wang i Qi Wang. "AttExplainer: Explain Transformer via Attention by Reinforcement Learning". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/102.
Pełny tekst źródłaZhou, Min, Chenchen Xu, Ye Ma, Tiezheng Ge, Yuning Jiang i Weiwei Xu. "Composition-aware Graphic Layout GAN for Visual-Textual Presentation Designs". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/692.
Pełny tekst źródła