Filters








26,541 Hits in 2.3 sec

Consolidating Masking Schemes [chapter]

Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede
2015 Lecture Notes in Computer Science  
In this paper we investigate relations between several masking schemes.  ...  of such a scheme.  ...  We gain deeper understanding about masking schemes from these relations and use it to provide a generalized masking scheme (Section 3).  ... 
doi:10.1007/978-3-662-47989-6_37 fatcat:7x62qtxfszgntmu7fbxck4hhga

Re-Consolidating First-Order Masking Schemes

Aein Rezaei Shahmirzadi, Amir Moradi
2020 Transactions on Cryptographic Hardware and Embedded Systems  
The other schemes, which can deal with two shares, often necessitates the use of fresh randomness.Here, in this work, we present a technique allowing us to use two shares to realize the first-order glitch-extended  ...  Among them, classical threshold implementations force the designers to use at least three shares in the underlying masking.  ...  As an essential underlying assumption of masking schemes, uniform sharing should also be achieved at the output of a masked (TI) function.  ... 
doi:10.46586/tches.v2021.i1.305-342 fatcat:xihq4odxd5df3lh42j56byc3sa

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners [article]

Ana Covic, Fatemeh Ganji, Domenic Forte
2021 arXiv   pre-print
With regard to these models, extensive research has been performed to realize masking schemes.  ...  tool to choose when designing masking schemes, and (3) identifies interesting new research directions where masking models and assessment tools can be applied.  ...  Consolidated masking schemes (CMS) were introduced by Reparaz in [144] . Such schemes use ISW AND and Trichina AND gates as building blocks consolidated with TI.  ... 
arXiv:2106.12714v2 fatcat:djqmxdobv5e3becegkmscz2zae

CTCV: A protocol for Coordinated Transport of Correlated Video in Smart Camera Networks

Vinay Kolar, Israat Tanzeena Haque, Vikram P. Munishwar, Nael B. Abu-Ghazaleh
2016 2016 IEEE 24th International Conference on Network Protocols (ICNP)  
To effectively support CTCV, we propose a video delivery protocol that consists of two primary components: (1) Consolidation of correlated videos from multiple cameras which removes spatially redundant  ...  Consolidation Schemes We propose two alternatives: (1) Consolidation by Aggregation (CA), which consolidates videos at intermediate routers to remove redundancy, and (2) Consolidation by Coordination (  ...  CC scheme In CC, the sink communicates the useful FoV through the mask: each camera transmits only the useful area at the sink, i.e. P k ⊆ P k and P k ≤ P k . 3.  ... 
doi:10.1109/icnp.2016.7784428 dblp:conf/icnp/KolarHMA16 fatcat:watmemzifvafpmi3y7ky5azjzu

The time course of consolidation in visual working memory

Edward K. Vogel, Geoffrey F. Woodman, Steven J. Luck
2006 Journal of Experimental Psychology: Human Perception and Performance  
Several theorists have proposed that this consolidation process is very slow. Here, we measured the time course of consolidation.  ...  representations that had not yet been consolidated.  ...  A Scheme for Consolidation and Masking In this final section, we outline a model of the masking and consolidation processes that we believe operate in the present study.  ... 
doi:10.1037/0096-1523.32.6.1436 pmid:17154783 fatcat:u7jaz27lxndrla57w2a6yjww3i

Regularizing daily routines for mental health during and after the COVID-19 pandemic

Wai Kai Hou, Francisco TT Lai, Menachem Ben-Ezra, Robin Goodwin
2020 Journal of Global Health  
Alternatively, nationwide voluntary schemes such as the UK' s GoodSam scheme provide useful personnel.  ...  It is important to note that some of them, for example the regular use of mask for infection prevention, will vary across sociocultural contexts.  ... 
doi:10.7189/jogh.10.020315 pmid:33110518 pmcid:PMC7535346 fatcat:tjvsxi5e25cxnbwouqvvuxajt4

Neural Speech Separation Using Spatially Distributed Microphones [article]

Dongmei Wang, Zhuo Chen, Takuya Yoshioka
2020 arXiv   pre-print
Our network estimates time-frequency (TF) masks for each speaker, which are then used to generate enhanced speech signals either with TF masking or beamforming.  ...  The mask-based MVDR enhancement scheme outperforms the TF masking as observed in some previous studies.  ...  Then, a global fusion layer consolidates the multi-channel information. Finally, TF masks are estimated for each speech source by the mask estimation layers.  ... 
arXiv:2004.13670v1 fatcat:clqv7mvwjjbudo4jbbidbvzv74

Neural Speech Separation Using Spatially Distributed Microphones

Dongmei Wang, Zhuo Chen, Takuya Yoshioka
2020 Interspeech 2020  
Our network estimates time-frequency (TF) masks for each speaker, which are then used to generate enhanced speech signals either with TF masking or beamforming.  ...  The mask-based MVDR enhancement scheme outperforms the TF masking as observed in some previous studies.  ...  Then, a global fusion layer consolidates the multi-channel information. Finally, TF masks are estimated for each speech source by the mask estimation layers.  ... 
doi:10.21437/interspeech.2020-1089 dblp:conf/interspeech/WangCY20 fatcat:cmw4c3mgfjf2lpaclfelvetbb4

Longitudinal Self-Supervision for COVID-19 Pathology Quantification [article]

Tobias Czempiel, Coco Rogers, Matthias Keicher, Magdalini Paschali, Rickmer Braren, Egon Burian, Marcus Makowski, Nassir Navab, Thomas Wendler, Seong Tae Kim
2022 arXiv   pre-print
For this purpose, longitudinal self-supervision schemes are explored on clinical longitudinal COVID-19 CT scans.  ...  In the segmentation masks, blue, orange, and green indicate healthy lung, GGO, and consolidation, respectively.  ...  consolidation (CONS).  ... 
arXiv:2203.10804v1 fatcat:kwupbldstzgnxi3tl3smqzmczq

Page 610 of Current Opinion Vol. 68, Issue 5 [page]

1920 Current Opinion  
The Ulster calculation is that while the South is powerless in the grip of the army of occupation, the Northern Government will have time not only to come into being but to consolidate its position against  ...  When it is opened, men with revolvers in their hands and masks on their faces rush in. The head of the household may be shot down if he resists the demands of these intruders.  ... 

Consolidating Inner Product Masking [chapter]

Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
2017 Lecture Notes in Computer Science  
In this work, we improve the practicality of the inner product masking scheme on multiple frontiers.  ...  Yet, several recent works have proposed masking schemes that are based on alternative encoding functions.  ...  In this respect, and despite the encoding of our consolidated inner product masking schemes has not changed compared to the latter two references, we aim to improve their results in three important directions  ... 
doi:10.1007/978-3-319-70694-8_25 fatcat:yzgaebrnwvdglf533ok2py5aey

ENCONTER: Entity Constrained Progressive Sequence Generation via Insertion-based Transformer [article]

Lee-Hsun Hsieh and Yang-Yin Lee and Ee-Peng Lim
2021 arXiv   pre-print
For example in Table 5 , "Group Consolidation" may be split into "handling Group s project / Consolidation".  ...  BBT ENCON-TER further incorporates a balanced tree reward scheme to make the generation process more efficient.  ... 
arXiv:2103.09548v1 fatcat:lxor65yn2vfdfb5w5homswrodi

Masking AES with $$d+1$$ Shares in Hardware [chapter]

Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2016 Lecture Notes in Computer Science  
To achieve this, we follow the conditions presented by Reparaz et al. at CRYPTO 2015 to allow hardware masking schemes, like Threshold Implementations, to provide theoretical higher-order security with  ...  Masking requires splitting sensitive variables into at least d + 1 shares to provide security against DPA attacks at order d.  ...  Consolidated Masking Scheme We now give an overview of the construction of CMS.  ... 
doi:10.1007/978-3-662-53140-2_10 fatcat:zyxgtv6adjhrzdvo46gi2zfsvi

Masking AES With d+1 Shares in Hardware

Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
2016 Proceedings of the 2016 ACM Workshop on Theory of Implementation Security - TIS'16  
To achieve this, we follow the conditions presented by Reparaz et al. at CRYPTO 2015 to allow hardware masking schemes, like Threshold Implementations, to provide theoretical higher-order security with  ...  Masking requires splitting sensitive variables into at least d + 1 shares to provide security against DPA attacks at order d.  ...  Consolidated Masking Scheme We now give an overview of the construction of CMS.  ... 
doi:10.1145/2996366.2996428 dblp:conf/ccs/CnuddeRBNNR16 fatcat:uj2d7vjp7jclnboe7ukmayqssm

Object recognition as ranking holistic figure-ground hypotheses

Fuxin Li, Joao Carreira, Cristian Sminchisescu
2010 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition  
consolidated one).  ...  The final masks are obtained from these segments, and their scores are a weighted sum of the individual segment scores. that cover a similar region and attempt to consolidate a single labeled mask from  ... 
doi:10.1109/cvpr.2010.5539839 dblp:conf/cvpr/LiCS10 fatcat:sgcwz2q7nre7zk4hlagkkpuzea
« Previous Showing results 1 — 15 out of 26,541 results