• No results found

Scan-based

A Hardware Security Solution against Scan-Based Attacks

A Hardware Security Solution against Scan-Based Attacks

... the scan chain as shown in figure ...the scan based attack, many recent encryption algorithms such as RSA [77], ECC [78] can be attacked successfully using the scan ...normal scan ...

90

Rectifying Various Scan-based Attacks on Secure IC'S

Rectifying Various Scan-based Attacks on Secure IC'S

... Scan-based test scheme is the powerful design for hardware testability for sequential circuits at production time and debugged infield. High fault coverage is obtained by scan-test fault diagnosis ...

7

3D Scan Based Wavelet Transform and Quality Control for Video Coding

3D Scan Based Wavelet Transform and Quality Control for Video Coding

... 3D scan-based wavelet trans- form method in removing the temporal blocking artifacts (jerks), we first extended EBWIC [13] to 3D ...3D scan- based temporal wavelet transform and a bitrate ...

10

Power Optimisation of Scan Based IC Testing

Power Optimisation of Scan Based IC Testing

... of scan flip-flops required for a scan-based design, and the basic procedure is to look for groups of "s-independent ...a scan flip-flop, the originally detectable faults are still ...

6

Design of Power Droop Reduction Scan Based Rc Logic Bist

Design of Power Droop Reduction Scan Based Rc Logic Bist

... conventional scan-based LBIST is replaced by new, proper test vector, referred to as substitute test ...obtained based on the test vectors to be applied at previous and future capture phases in order ...

6

Computed tomography scan based prediction of the vulnerable carotid plaque

Computed tomography scan based prediction of the vulnerable carotid plaque

... Background: Primary to validate a commercial semi-automated computed tomography angiography (CTA) – software for vulnerable plaque detection compared to histology of carotid endarterectomy (CEA) specimens and secondary ...

8

Defeating scan based attacks on secure AES with  on chip comparison

Defeating scan based attacks on secure AES with on chip comparison

... and scan out the response F, 3) reset the circuit and encrypt another plaintext, 4/ switch to test mode and scan out the response ...two scan responses. For example, if the first scan-out ...

11

Analog and Mixed Signal Test Method based on OBIST Technique

Analog and Mixed Signal Test Method based on OBIST Technique

... Some testing approaches are Ad-hoc test, Scan-based test (Path-scan, Boundary-scan) and Self-test (Built-in self-test, Built-in logic observation).In this paper we have us[r] ...

5

Scan Latch Partitioning into Multiple Scan Chains for Power Minimization in Full Scan Sequential Circuits

Scan Latch Partitioning into Multiple Scan Chains for Power Minimization in Full Scan Sequential Circuits

... is based on a resource graph formulation for the test problem and tests are scheduled concurrently without exceeding their power ratings during test applica- ...is based on test vector ordering ...in ...

8

A Techncial Survey of Important Research works in VLSI Test Scan Architecture

A Techncial Survey of Important Research works in VLSI Test Scan Architecture

... decompression scan architecture based on cyclical scan register, modified enhanced scan forest, logic scan cell architecture, scan architecture for low power delay fault testing, ...

9

Extension of graph clustering algorithms based on SCAN method in order to target weighted graphs

Extension of graph clustering algorithms based on SCAN method in order to target weighted graphs

... extended SCAN-based algorithms to be able to identify community structure in weighted graphs, to be competing with the top-rated Fast Modularity method and producing better results (identifying more nodes ...

91

A Particle Swarm based Approach for Classification of Cancer based on CT Scan

A Particle Swarm based Approach for Classification of Cancer based on CT Scan

... developed based on X-ray and cross-sectional Many techniques have been developed based on X-ray and cross-sectional images like Computed Tomography (CT) or Magnetic Resonance Imaging (MRI), or other ...

6

Orchestrating Mathematical Discourse: Affordances and Hindrances for Novice Elementary Teachers

Orchestrating Mathematical Discourse: Affordances and Hindrances for Novice Elementary Teachers

... Researchers that have used classroom observations as a measure of teaching practices have reported mixed findings in regard to the relationship between teachers’ epistemological beliefs and enacted practice. Early work ...

200

A flexibly shaped spatial scan statistic for detecting clusters

A flexibly shaped spatial scan statistic for detecting clusters

... spatial scan statistic, we set the restriction that irregularly shaped windows Z with length k( ≤ K) are constructed from mem- bers of the (K - 1)-nearest neighbours to the starting ...spatial scan ...

15

ATTITUDINAL SCAN

ATTITUDINAL SCAN

... opinions based on likings, feeling and situation when influenced by superior, subordinate and peers, may have some linkage to unforgetful or unforgivable which is the point of action where attitudes ...

5

A flexibly shaped space-time scan statistic for disease outbreak detection and monitoring

A flexibly shaped space-time scan statistic for disease outbreak detection and monitoring

... area- based disease data have been developed ...spatial scan statistic [8] has been used extensively for the detections and evaluation of purely spatial disease clusters along with the SaTScan software ...

14

1.
													Image encryption using rangoli based scan pattern and random number

1. Image encryption using rangoli based scan pattern and random number

... encryption based on unpredictable character to reduce the exhaustive key search attack by disordering the distributive characteristics of RGB ...encoding based algorithm, which is a combination of block ...

9

A scan statistic for continuous data based on the normal probability model

A scan statistic for continuous data based on the normal probability model

... In this paper we develop a scan statistic for continuous data that is based on the normal probability model. Under the null hypothesis, all observations come from the same distribution. Under the ...

9

Scan API Scan Caching Scan Batching Filters

Scan API Scan Caching Scan Batching Filters

... 2: Configure Scanner Caching per HTable Instance • Call hTable.setScannerCaching10 to change caching per HTable instance • Will override caching configure for the entire HBase cluster • [r] ...

22

Human Identification System Based On Iris Scan

Human Identification System Based On Iris Scan

... approach based on human iris pattern is represented. The system is based on several steps from capturing the iris pattern, determining and localizing the iris boundaries, transformation of localized iris ...

6

Show all 10000 documents...

Related subjects