-
13961
Improving Firebase BaaS Service Security in Counseling Chat Applications: AES-256 and CBC Approach for End-to-End Encryption
Published 2023-12-01“…AES basically uses a block cipher with a length of 128 bits as the default operation, and the key length size varies from 128, 192 and 256 bits. so AES uses a 4x4 matrix equation with each section having a size of 1 byte. …”
Get full text
Article -
13962
Baseline Calibration Scheme Embedded in Single-Slope ADC for Gas Sensor Applications
Published 2024-03-01“…It demonstrated a signal-to-noise and distortion ratio (SNDR) of 57.56 dB and a spurious-free dynamic range (SFDR) of 59.02 dB, resulting in an effective number of bits (ENOB) of 9.27 bits in the post-simulation level. …”
Get full text
Article -
13963
Classical Coherent States Based Quantum Information Processing and Quantum Computing Analogs
Published 2024-01-01“…Deymier’s group has shown that phase bits (phi-bits) gates implemented by employing the topological acoustics (TA) principles can be used to implement the TA-based quantum computing analogs. …”
Get full text
Article -
13964
-
13965
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…Abstract Large‐state block ciphers with 256 bits or 512 bits block sizes receive much attention from the viewpoint of long‐term security. …”
Get full text
Article -
13966
Vulnerability and adaptation to climate change in Rajasthan
Published 2022-01-01Get full text
Article -
13967
Signal-Independent Background Calibration with Fast Convergence Speed in Pipeline-SAR ADC
Published 2023-01-01“…Moreover, the first sub-ADC is designed with extended conversion bits to quantize its own residue after delivering the conversion bits required by the first stage. …”
Get full text
Article -
13968
Secure and Efficient Authentication Scheme in IoT Environments
Published 2021-01-01“…The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.…”
Get full text
Article -
13969
Structural Characterization of Composites Based on Butadiene Rubber and Expanded Perlite
Published 2023-11-01Get full text
Article -
13970
Numerical investigation on effect of spark plug configuration on performance in an engine cylinder
Published 2023-01-01Get full text
Article -
13971
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Published 2024-02-01“…This iteration of the Internet protocol is superior, particularly in surveillance contexts, given its expansive address capacity (128 bits) juxtaposed against its antecedent, the IPv4 protocol (32 bits). …”
Get full text
Article -
13972
Interaction of Recombinant Human Regulatory Factor X, 6 DNA Binding Region with Insulin Promoter in vitro
Published 2016-12-01Get full text
Article -
13973
Characterizing the Asymptotic Per-Symbol Redundancy of Memoryless Sources over Countable Alphabets in Terms of Single-Letter Marginals
Published 2014-07-01“…The minimum expected number of bits needed to describe a random variable is its entropy, assuming knowledge of the distribution of the random variable. …”
Get full text
Article -
13974
Histopathological effects of intramuscular metamizole sodium on rat sciatic nerve
Published 2016-08-01Get full text
Article -
13975
The Magic of ELFs
Published 2021“…In particular, we show how to use ELFs to build secure point function obfuscation with auxiliary input, as well as polynomially many hardcore bits for any one-way function. Such applications were previously known from strong knowledge assumptions—for example, polynomially many hardcore bits were only known from differing inputs obfuscation, a notion whose plausibility has been seriously challenged. …”
Get full text
Article -
13976
Fast, Metadata-private Anonymous Broadcast
Published 2023“…With 32 servers located across four geographic regions, Trellis achieves a throughput of 200 bits per second with 100,000 users. With 64 servers, Trellis achieves a throughput of 320 bits per second. …”
Get full text
Thesis -
13977
ASIC implementation of counter-based 1-D DCT processor
Published 2010“…It uses counters to store values of partial product matrix from inner products, which transforms L vertical bits into ⌊log2L⌋+1 horizontal bits of the accumulated matrix and thus reduces the matrix height drastically. …”
Get full text
Final Year Project (FYP) -
13978
PERANCANGAN SANDI BCH (15,7) BERBASIS FPGA SPARTAN-3E DAN DELPHI 7
Published 2010“…This research shows that this design can work well, any 2 bits error in some position of I 5 bits has been corrected.…”
Article -
13979
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…The objective of this project is to design a synthesizable SHA-3 with 256-bits hash output and 1600-bits state array with lower area compared to Intel Microelectronic SHA-3. …”
Get full text
Thesis -
13980