搜索结果: 1-15 共查到“知识库 Power”相关记录1265条 . 查询时间(0.111 秒)
Baseball players need to be explosive and powerful to throw, hit, jump, run, and change directions. This is so important it has to consistently be addressed in a baseball player’s training. While it i...
Why Soccer Players Need Rotational Power (and How to Build it)
Soccer Strength Training Rotational power
2024/12/12
If you want to be the best soccer player possible, you need rotational power.While I am all for Squats, Lunge variations, Pull-ups, Push-ups and Deadlifts for building maximal strength, I believe rota...
Today, football, hockey, rugby teams, etc., use martial arts training in their practice sessions. It is highly effective because you learn to leverage your opponent in martial arts like Jeet Kung Do (...
The Power of NIST Cryptographic Statistical Tests Suite
Statistical testing Cryptographic evaluation Random bit generators
2019/8/8
This paper is focused on an open question regarding the correlation and the power of NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve the ...
This paper presents an efficient algorithm for computing 11th11th-power residue symbols in the cyclotomic field Q(ζ11)Q(ζ11), where ζ11ζ11 is a primitive 11th11th root of unity. It extends an earlier ...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
On-Device Power Analysis Across Hardware Security Domains
side-channel power analysis cross-domain
2019/6/12
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the dev...
Identity-Based Encryption from e-th Power Residue Symbols
identity-based encryption ee-th power residue symbol the general reciprocity law on function fields
2019/5/27
This paper generalizes the notable Galbrath's test by introducing the general reciprocity law on function fields. With the help of the extended Galbrath's test, we show the scheme of Boneh, LaVigne an...
评价双腔Power PICC置管部位医用粘胶剂相关性皮肤损伤的风险预防管理效果。方法 将2015年1月—2017年12月我院外科置入耐高压注射型双腔Power PICC患者156例,按时间顺序分为对照组85例,干预组71例。对照组采用常规护理方案预防皮肤损伤;干预组在对照组的基础上实施风险评估、风险防护及风险管理的一系列预防措施,比较2组患者医用粘胶剂相关性皮肤损伤的发生率。
Modeling Power Efficiency of S-boxes Using Machine Learning
Power Efficiency Optimal S-box Dynamic power
2019/2/26
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
On the (non) obfuscating power of Garside Normal Forms
group based cryptography post-quantum digital signatures conjugacy search problem
2018/11/30
Braid groups are infinite non-abelian groups naturally arising from geometric braids that have been used in cryptography for the last two decades. In braid group cryptography public braids often conta...
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
side-channel analysis FPGA
2018/11/13
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet ext...
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Side-channel analysis Convolutional Neural Networks Machine learning
2018/11/2
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Differential Power Analysis of XMSS and SPHINCS
Post-quantum cryptography Hash-based signatures DPA
2018/7/16
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
Static Power Side-Channel Analysis - A Survey on Measurement Factors
CMOS Measurement Factors
2018/7/16
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...