-
14581
Frequency-Coded Chipless RFID Tags: Notch Model, Detection, Angular Orientation, and Coverage Measurements
Published 2020-03-01“…This paper focuses on the frequency coded chipless Radio Frequency Identification (RFID) wherein the tag’s information bits are physically encoded by the resonators’ notch position which has an effect on the frequency spectrum of the backscattered or retransmitted signal of the tag. …”
Get full text
Article -
14582
Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions
Published 2021-03-01“…Handshakes between client devices containing the physical unclonable functions (PUFs) and a server are used to select sets of addressable positions in the PUFs, from which streams of bits called seeds are generated on demand. The public and private cryptographic key pairs are computed from these seeds together with additional streams of random numbers. …”
Get full text
Article -
14583
Edge-assisted quantum protocol for secure multiparty logical AND its applications
Published 2023-07-01“…In this paper, we present a feasible quantum solution to an important primitive of secure multiparty computations, i.e., Secure Multiparty Logical AND (SMLA), in which n participants can securely compute logical AND of n private bits. In order to ensure perfect security and achieve good feasibility, we introduce a semi-honest edge server and two non-collusive fog nodes, and design a secure and feasible edge-assisted quantum protocol for SMLA, which cleverly utilizes Secure Multiparty XOR to implement SMLA group by group. …”
Get full text
Article -
14584
QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution
Published 2022-01-01“…It adopts the use of a biased operator choice, thus, increasing the rate of generated bits. Several measures have been integrated to protect the sent qubits. …”
Get full text
Article -
14585
A New Quantum Private Protocol for Set Intersection Cardinality Based on a Quantum Homomorphic Encryption Scheme for Toffoli Gate
Published 2023-03-01“…The simulation of the quantum homomorphic encryption scheme for the Toffoli gate on two quantum bits is given by the IBM Quantum Experience platform. …”
Get full text
Article -
14586
A Methodology to Analyze the Fault Tolerance of Demosaicking Methods against Memory Single Event Functional Interrupts (SEFIs)
Published 2020-10-01“…A single event functional interrupt (SEFI) can affect the behavior of a memory chip, with one or more rows, columns or even the whole device producing a wrong value when reading a set of stored bits. This problem may affect raw Bayer images stored in satellites and other spacecraft. …”
Get full text
Article -
14587
Finite-key security analysis for multilevel quantum key distribution
Published 2016-01-01“…The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d -level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d -level 2- and 3-MUB QKD protocols). …”
Get full text
Article -
14588
Secret Key Distillation with Speech Input and Deep Neural Network-Controlled Privacy Amplification
Published 2023-03-01“…For a sampling rate of 16 kHz and quantization of input speech signals with 16 bits per sample, the system provides secret keys at a rate of 28 kb/s. …”
Get full text
Article -
14589
Repair Rates for Multiple Descriptions on Distributed Storage
Published 2022-04-01“…The question is how many extra bits are needed for repair. We find an achievable rate and show that this is optimal in certain cases. …”
Get full text
Article -
14590
EXPRESS: Exploiting Energy–Accuracy Tradeoffs in 3D NAND Flash Memory for Energy-Efficient Storage
Published 2022-01-01“…The density and cost-effectiveness of flash memory chips continue to increase, driven by: (a) The continuous physical scaling of memory cells in a single layer; (b) The vertical stacking of multiple layers; and (c) Logical scaling through storing multiple bits of information in a single memory cell. The physical properties of flash memories impose disproportionate latency and energy expenditures to ensure the high integrity of the data during flash memory writes. …”
Get full text
Article -
14591
A Soft-Error-Tolerant SAR ADC with Dual-Capacitor Sample-and-Hold Control for Sensor Systems
Published 2021-07-01“…The measured analog signal is converted into digital bits through the sensor readout system. However, in extreme radiation environments, such as in space, during flights, and in nuclear fusion reactors, the performance of the analog-to-digital converter (ADC) constituting the sensor readout system can be degraded due to soft errors caused by radiation effects, leading to system malfunction. …”
Get full text
Article -
14592
Development and Application of MAGIC-f Gel in Cancer Research and Medical Imaging
Published 2021-08-01“…Finally, various future works are suggested based on the past and present works on MAGIC-f gel and polymer gel in general, with the hope that these bits of knowledge can provide important clues for future research on MAGIC-f gel as a dosimeter.…”
Get full text
Article -
14593
8×8 S-boxes over Klein four-group and Galois field $ {GF}\left({2}^{4}\right) $: AES redesign
Published 2024-03-01“…Nonlinear properties were mainly set to inspect the behavior of I/O bits and could apply image encryption. Then, the performance of proposed S-boxes and newly structured AES was tested in comparison with other prevailing S-boxes.…”
Get full text
Article -
14594
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree
Published 2013-12-01“…On the basis of the information of collision bits, some idle timeslots can be eliminated through pruning the 4-ary tree. …”
Get full text
Article -
14595
A Multi-Channel Electromyography, Electrocardiography and Inertial Wireless Sensor Module Using Bluetooth Low-Energy
Published 2020-06-01“…The sensor is able to acquire up to three independent bioelectrical channels (six electrodes), each with 24 bits of resolution and a sampling rate up to 3.2 kHz, and has a 6-DoF inertial platform measuring linear acceleration and angular velocity. …”
Get full text
Article -
14596
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
Published 2021-01-01“…Concrete parameter specifications are suggested under the 102 and 218 bits post‐quantum security, respectively. Compared with the implicit authenticated key exchange derived directly from the key encapsulation mechanism, our proposals reduce the communication costs by 21.7% and 25.7%, respectively, under the same post‐quantum security level. …”
Get full text
Article -
14597
True Random Number Generator Based on RRAM-Bias Current Starved Ring Oscillator
Published 2023-01-01“…The oscillation frequency is finally leveraged to extract the sequence of random bits. The design is simple and adds low area overhead. …”
Get full text
Article -
14598
A Gaussian-Distributed Quantum Random Number Generator Using Vacuum Shot Noise
Published 2020-06-01“…Furthermore, a related post-processing method, which maintains the fine distribution and autocorrelation properties of raw data, is exploited to extend the precision of generated Gaussian distributed random numbers to over 20 bits, making the sequences possible to be utilized by the following system with requiring high precision numbers. …”
Get full text
Article -
14599
A Novel Turbo Detector Design for a High-Speed SSVEP-Based Brain Speller
Published 2022-12-01“…The results show that the turbo detector can achieve an average ITR of 130 bits/min, which is about 8% higher than FBCCA. As the size of the data pool increases, the ITR of the turbo detector could be further improved.…”
Get full text
Article -
14600
Distribution and Seasonal Variations of <em>Argas persicus</em> in Senegal
Published 2004-01-01“…Traditional fowl houses – habitat of this tick species – were characterized in rural areas and various models were described: the bits-and-pieces model, thorn-branches model, weaved-plants models, and clay-made models. …”
Get full text
Article