Filters








11,736 Hits in 3.6 sec

Side-Channel Leakage across Borders [chapter]

Jörn-Marc Schmidt, Thomas Plos, Mario Kirschbaum, Michael Hutter, Marcel Medwed, Christoph Herbst
2010 Lecture Notes in Computer Science  
The confidentiality of this data is threatened by information leakage via side channels like the power consumption or the electromagnetic radiation.  ...  In this paper, we show that the side-channel leakage in the power consumption is not limited to the power-supply lines and that any input/output (I/O) pin can comprise secret information.  ...  In [15] , Plos pointed out the problem of side-channel leakage via I/O pins of RFID tags.  ... 
doi:10.1007/978-3-642-12510-2_4 fatcat:tso7yj44tjatrddmrajiqmldmm

One size fits all?: A simulation framework for face-mask fit on population-based faces

Tomas Solano, Rajat Mittal, Kourosh Shoele, Edoardo Sinibaldi
2021 PLoS ONE  
Besides mask size, side-edge tuck-in, or pleating, of the masks as a design parameter was also studied and found to have the potential to cause a larger localized gap opening.  ...  The fit of simple cloth masks on the face, as well as the resulting perimeter leakage and face mask efficacy, are expected to be highly dependent on the type of mask and facial topology.  ...  Upon integrating v across the height of the channel, the PLOS ONE One size fits all?  ... 
doi:10.1371/journal.pone.0252143 pmid:34133436 fatcat:m2kzbtegqjavdmon6ebzms4rka

Fabrication of suspended metallic structures: application to a one-shot micro-valve

A. Debray, K. Ueda, M. Shibata, H. Fujita
2007 IEICE Electronics Express  
It can be broken by applying an appropriate pressure difference across the channel (figure 1-b).  ...  We can see the alloy surface on the back side being regular and that the alloy did not penetrate inside the channel.  ... 
doi:10.1587/elex.4.455 fatcat:btqmklxpdbecdonhv2or33ejr4

Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations [chapter]

Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2014 Lecture Notes in Computer Science  
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding.  ...  the signal-to-noise ratio of available leakage.  ...  Single-Execution Side-Channel Leakage of Exponentiations Segmenting Side-Channel Measurements of Exponentiations A side-channel measurement trace vector t = (t 1 , ... , t l ) of an exponentiation contains  ... 
doi:10.1007/978-3-319-08302-5_6 fatcat:3cgzogdss5ei5pr7eee5z2wcpi

Clustering Algorithms for Non-profiled Single-Execution Attacks on Exponentiations [chapter]

Johann Heyszl, Andreas Ibing, Stefan Mangard, Fabrizio De Santis, Georg Sigl
2014 Lecture Notes in Computer Science  
Side-channel attacks on secret exponents are typically bound to the leakage of single executions because of cryptographic protocols or side-channel countermeasures such as blinding.  ...  the signal-to-noise ratio of available leakage.  ...  Single-Execution Side-Channel Leakage of Exponentiations Segmenting Side-Channel Measurements of Exponentiations A side-channel measurement trace vector t = (t 1 , ... , t l ) of an exponentiation contains  ... 
doi:10.1007/978-3-319-14123-7_6 fatcat:sxv4eufmijg7vhyoi2um2ceobi

Eavesdropping and countermeasures for backflash side channel in quantum cryptography

Paulo Vinicius Pereira Pinheiro, Poompong Chaiwongkhot, Shihan Sajeed, Rolf T. Horn, Jean-Philippe Bourgoin, Thomas Jennewein, Norbert Lütkenhaus, Vadim Makarov
2018 Optics Express  
One of the assumptions is an absence of information leakage about individual photon detection outcomes of the receiver unit.  ...  Here we investigate the information leakage from a QKD receiver due to photon emission caused by detection events in single-photon detectors (backflash).  ...  Next, we characterize the backflash emission as a possible side channel. A.  ... 
doi:10.1364/oe.26.021020 pmid:30119408 fatcat:lnchvx6yfrelbelzjieqwtxm6a

Fossil fuel supply, leakage and the effectiveness of border measures in climate policy

Stefan Boeters, Johannes Bollen
2012 Energy Economics  
Understanding fossil fuel supply behaviour is crucial for interpreting carbon leakage and assessing the potential effectiveness of border measures in climate policy.  ...  We propose an alternative production function that has a constant elasticity of fuel supply, which results in more stable leakage rates and a different share of trade-related leakage.  ...  This is the channel of leakage that border measures are designed to counteract. However, this is not the only mechanism at work.  ... 
doi:10.1016/j.eneco.2012.08.017 fatcat:w2rdwckelffn7d6edwi2uk5vn4

Page 512 of Journal of the American College of Surgeons Vol. 9, Issue 5 [page]

1909 Journal of the American College of Surgeons  
Up to the time of removing the drain there had been no leakage whatever, and the question is consequently invited whether, if the suture line on this side tod had been permitted to come into contact with  ...  the lateral structures, leakage would have occurred at all.  ... 

Page 154 of Nature: New Biology Vol. 240, Issue 100 [page]

1972 Nature: New Biology  
Furthermore, the photoemf does not act across the ionic leakage conductance channel, but only across the magnesium-porphyrin conductance channel.  ...  Thus all feedback current changes are attributable to a photoemf across this channel, its conduct- ance being fixed.  ... 

Subglobal carbon policy and the competitive selection of heterogeneous firms

Edward J. Balistreri, Thomas F. Rutherford
2012 Energy Economics  
Subglobal action impacts emissions in unconstrained countries (carbon leakage) through international trade channels.  ...  These differences are important as an alternative, and arguably more plausible, representation of how trade and border adjustments interact with climate policy.  ...  This can be an important channel for leakage that is induced by lower fuel prices faced by unregulated regions.  ... 
doi:10.1016/j.eneco.2012.08.002 fatcat:smcsxhbupfemnjusc7xf6kjzdi

Channels of small-arms proliferation: Policy implications for Asia-Pacific

Stefanie Koorey, Stefan Markowski, Peter Hall, Jurgen Brauer
2008 The Economics of Peace and Security Journal  
While not listed in any order of significance or magnitude, the main transfer features of the illicit South and Southeast Asian small arms market are smuggling across borders, leakage from state security  ...  On the right-hand side of the figure, illicitly-held stock is fed by leakages from legallyheld stock, illicit domestic manufacture, and various forms of illicit imports.  ... 
doi:10.15355/epsj.3.1.79 fatcat:3x4tegvdlbgcphi6i5iaqkotau

Titania/alumina bilayer gate insulators for InGaAs metal-oxide-semiconductor devices

Jaesoo Ahn, Irina Geppert, Marika Gunji, Martin Holland, Iain Thayne, Moshe Eizenberg, Paul C. McIntyre
2011 Applied Physics Letters  
current density across the bilayer gate dielectrics was also compared to that of Al 2 O 3 single layers.  ...  Because silicon semiconductor channels are reaching their scaling limits, III-V compound semiconductor channels coated by deposited high-k dielectrics are the subject of intense interest for high performance  ... 
doi:10.1063/1.3662966 fatcat:czl5242pgzfgbnjfr5lv3pmcou

Semiautomation of Irrigated Basins and Borders: I. Single-function Turnout Gates

A. S. Humpherys
1995 Applied Engineering in Agriculture  
Gates for pipe turnouts were also tested in a 10 ha (25 acre) border system.  ...  Iivo types of single-function, drop-closed gates for serniautomating irrigated basin and border systems are described Gate design, construction, and operational information are presented.  ...  However, most basin and border systems in the United States have lowgradient supply channels because fields most feasibly irrigated with these systems have very little side slope.  ... 
doi:10.13031/2013.25718 fatcat:as4pkvr3d5g3ho2m3npzkqrjvm

Active-edge planar radiation sensors

C.J. Kenney, J.D. Segal, E. Westbrook, Sherwood Parker, J. Hasi, C. Da Via, S. Watts, J. Morse
2006 Nuclear Instruments and Methods in Physics Research Section A : Accelerators, Spectrometers, Detectors and Associated Equipment  
Their edges can be defined and also passivated by growing, in an intermediate step, a field oxide on the side surfaces.  ...  For the situation in which a reverse bias is used across a junction, and when leakage currents are negligible, one can use the non-linear Poisson equation only, Ref. [15] .  ...  Signal from edge and next-to-edge channels as the sensor is scanned across the X-ray microbeam, but now with zero bias voltage.  ... 
doi:10.1016/j.nima.2006.05.012 pmid:18185839 pmcid:PMC2186206 fatcat:fhs3dc6orvfqpglno36y4ul2pa

Page 340 of American Society of Civil Engineers. Collected Journals Vol. 127, Issue 4 [page]

2001 American Society of Civil Engineers. Collected Journals  
wet and indicate seepage and/or leakage through the dam.  ...  Concrete outlet channel filled with branches and debris to a one foot depth. Leakage through right sluice gate 37.9 L/min (10 gpm) and left sluice gate 18.9 L/ min (5 gpm).”  ... 
« Previous Showing results 1 — 15 out of 11,736 results