DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 43.055
1.
  • Incidence and US Costs of C... Incidence and US Costs of Corticosteroid-Associated Adverse Events: A Systematic Literature Review
    Sarnes, Evelyn, PharmD, MPH; Crofford, Leslie, MD; Watson, Maria, PhD ... Clinical therapeutics, 10/2011, Letnik: 33, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    Abstract Objective The objective of this systematic literature review was to evaluate the incidences and risks for adverse events (AEs) associated with oral and parenteral corticosteroids. An ...
Celotno besedilo
Dostopno za: UL

PDF
2.
  • DECODING OF THE NONLINEAR E... DECODING OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL
    D. M. Bildziuk; S. B. Salomatin Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 06/2019 8
    Journal Article
    Recenzirano
    Odprti dostop

    The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. Correction properties and fast decoding algorithms of a Rijndael-code ...
Celotno besedilo
Dostopno za: UL
3.
  • DISTANCE PROPERTIES OF THE ... DISTANCE PROPERTIES OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL
    D. M. Bildziuk; S. B. Salomatin Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki, 06/2019 7
    Journal Article
    Recenzirano
    Odprti dostop

    The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. Hamming distance properties of a Rijndael-code in thread and block ...
Celotno besedilo
Dostopno za: UL
4.
  • An Energy-Efficient Reconfi... An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications
    Banerjee, Utsav; Wright, Andrew; Juvekar, Chiraag ... IEEE journal of solid-state circuits, 2019-Aug., 2019-8-00, Letnik: 54, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    This paper presents the first hardware implementation of the datagram transport layer security (DTLS) protocol to enable end-to-end security for the Internet of Things (IoT). A key component of this ...
Celotno besedilo
Dostopno za: UL

PDF
5.
  • The design of scalar AES In... The design of scalar AES Instruction Set Extensions for RISC-V
    Marshall, Ben; Newell, G. Richard; Page, Dan ... IACR transactions on cryptographic hardware and embedded systems, 12/2020, Letnik: 2021, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • Persistent Fault Analysis on Block Ciphers
    Fan Zhang; Xiaoxuan Lou; Xinjie Zhao ... IACR transactions on cryptographic hardware and embedded systems, 08/2018, Letnik: 2018, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent ...
Celotno besedilo
Dostopno za: UL
7.
  • An image encryption scheme ... An image encryption scheme based on elliptic curve pseudo random and Advanced Encryption System
    Toughi, Shahryar; Fathi, Mohammad H.; Sekhavat, Yoones A. Signal processing, December 2017, 2017-12-00, Letnik: 141
    Journal Article
    Recenzirano

    •Usage of EC operations as initial random generator and encrypting through AES to generate new pseudo random to mask whole image pixels.•Simulations and analysis results show that cooperation of AES ...
Celotno besedilo
Dostopno za: UL
8.
  • FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data
    Jin Hyung Park; Dong Hoon Lee IACR transactions on cryptographic hardware and embedded systems, 08/2018, Letnik: 2018, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The Advanced Encryption Standard (AES) algorithm and Counter (CTR) mode are used for numerous services as an encryption technique that provides confidentiality. Even though the AES with counter (AES ...
Celotno besedilo
Dostopno za: UL
9.
  • Patterns of agri-environmen... Patterns of agri-environmental scheme participation in Europe: Indicative trends from selected case studies
    Pavlis, Evangelos S.; Terkenli, Theano S.; Kristensen, Søren B.P. ... Land use policy, 11/2016, Letnik: 57
    Journal Article
    Recenzirano

    •We examine farmers' motives to participate in agri-environmental schemes (AES), in five study areas in Europe.•Our principal findings show that AES tend to be used by larger scale and more ...
Celotno besedilo
Dostopno za: UL
10.
  • AES-LBBB: AES Mode for Ligh... AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption
    Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi IACR transactions on cryptographic hardware and embedded systems, 07/2021, Letnik: 2021, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high ...
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 43.055

Nalaganje filtrov