DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Hamming weight
Hamming weight
Hamming Weight Attacks on Cryptographic Hardware – Breaking Masking Defense?
Type I Codes Over GF(4)
Arxiv:1311.6244V1 [Physics.Comp-Ph] 25 Nov 2013
Faster Population Counts Using AVX2 Instructions
Coding Theory and Applications Solved Exercises and Problems Of
Conversion of Mersenne Twister to Double-Precision Floating-Point
Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
Calculating Hamming Distance with the IBM Q Experience José Manuel Bravo
[email protected]
Prof
FED-STD-1037C the Number of Digit Positions in Which the Corresponding Digits of Two Binary Numbers Or Words of the Same Length
Bits and Bit Sequences Integers
A Loopless Gray Code for Minimal Signed-Binary Representations
Calculating Hamming Distance with the IBM Q Experience José Manuel Bravo
[email protected]
Prof
Arxiv:1809.02161V1 [Cs.PL] 6 Sep 2018 – Little-Used and Unclear Corner Cases in the Language Standards
Hardware Instruction Based Crc32c, a Better Alternative to the Tcp One’S Complement Checksum
Cidpro: Custom Instructions for Dynamic Program Diversification
Floating-Point Homomorphic Encryption
Leaky Nets: Recovering Embedded Neural Network Models and Inputs Through Simple Power and Timing Side-Channels – Attacks and Defenses
Can Code Polymorphism Limit Information Leakage?
Top View
Self Evaluation : Hierocrypt–L1
SIMD for C++ Developers Contents Introduction
Reliable Computing I – Lecture 6
The Design of Scalar AES Instruction Set Extensions for RISC-V
Accelerating Binary String Comparisons with a Scalable, Streaming-Based System Architecture Based on Fpgas
Opportunistic Memory Systems in Presence of Hardware Variability
Computation of Minimum Hamming Weight for Linear Codes
Study of a Novel Software Constant Weight Implementation
Loop Transversal Codes Over Finite Rings Ruben Hranti Aydinyan Iowa State University
Rigidity of Microsphere Heaps
Gray Codes Contents 1 Exhaustive Generation 2 Gray Codes
Macwilliams Identity for M-Spotty Hamming Weight Enumerator Over
Testing Static Analyses for Precision and Soundness
Generalized Hamming Weights for Linear Codes
Random Small Hamming Weight Products with Applications to Cryptography
Hacking Using Sat and Smt Solvers
When Huffman Meets Hamming: a Class of Optimal Variable-Length Error Correcting Codes
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
Codes Over Z4 2.1 the Puzzle What Is the Largest Binary Code of Length 16 Having Minimum Distance 6? It Turns out That No Such Code Can Have More Than 256 Codewords
Study of Bitwise Operations on Non-Scarce Attribute Based Data Structures in Postgresql
Yale University Department of Computer Science
Gray Codes and Symmetric Chains∗
KEM and PKE Based on (Ring) Learning with Rounding Tuesday 18Th February, 2020
Investigating the Effects Various Compilers Have on the Electromagnetic Signature of a Cryptographic Executable
CSE 140 Homework Two
2 Sep 2021 Quaternions Over Galois Rings and Their Codes
The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem
Correlation Power Analysis with a Leakage Model
A Synthesizing Superoptimizer
Differential Power Analysis Side-Channel Attacks In
Provably Trustworthy and Secure Hardware Design with Low Overhead
Lecture 1: Basic Problems of Coding Theory
Compiler Optimizations As a Countermeasure Against Side-Channel Analysis in MSP430-Based Devices
On the Low Hamming Weight Discrete Logarithm Problem for Nonadjacent Representations
Compact Zero-Knowledge Proofs of Small Hamming Weight
On Coding Over Sliced Information
High Performance Implementation of Winner Selection Algorithms
The Minimum Distance of a Code 1 Hamming Distance 2 the Minimum
High Performance and Reliable Algebraic Computing Clément Pernet
Counting Sequences, Gray Codes and Lexicodes Counting Sequences, Gray Codes and Lexicodes
Side Channel Analysis Research Framework (SCARF)
Monte Carlo Determination of Bounds on Error Correcting Codes
Optimal Average Joint Hamming Weight and Minimal Weight Conversion of D Integers
Obfuscation with Mixed Boolean-Arithmetic Expressions : Reconstruction, Analysis and Simplification Tools Ninon Eyrolles
On the Distribution of Low Hamming Weight Products Jianghua Li1* and Qiao Li1
Physically Unclonable Functions Found in Standard PC Components (PUFFIN)
One Exploit to Rule Them All? on the Security of Drop-In Replacement and Counterfeit Microcontrollers
A Synthesizing Superoptimizer
Determining the Generalized Hamming Weight Hierarchy of The
Analyzing Error Detection Performance of Checksums in Embedded Networks
Self Evaluation : Hierocrypt–3
WO 2015/116184 Al 6 August 2015 (06.08.2015) P O P C T
Notes 1: Introduction, Linear Codes January 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami
SIDE CHANNEL ATTACK with HAMMING WEIGHT LEAKAGE By
Lecture 13 1 Introduction 2 Definitions