Journal articles on the topic 'Secure Circuit'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Circuit.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abadi, Martín, and Joan Feigenbaum. "Secure circuit evaluation." Journal of Cryptology 2, no. 1 (1990): 1–12. http://dx.doi.org/10.1007/bf02252866.
Full textAlexeyev, Alexander A., and Michael M. Green. "Secure Communications Based on Variable Topology of Chaotic Circuits." International Journal of Bifurcation and Chaos 07, no. 12 (1997): 2861–69. http://dx.doi.org/10.1142/s0218127497001941.
Full textCHEN, Huanhuan. "Quantum secure circuit evaluation." Science in China Series F 47, no. 6 (2004): 717. http://dx.doi.org/10.1360/03yf0457.
Full textÇİÇEK, SERDAR, YILMAZ UYAROĞLU, and İHSAN PEHLİVAN. "SIMULATION AND CIRCUIT IMPLEMENTATION OF SPROTT CASE H CHAOTIC SYSTEM AND ITS SYNCHRONIZATION APPLICATION FOR SECURE COMMUNICATION SYSTEMS." Journal of Circuits, Systems and Computers 22, no. 04 (2013): 1350022. http://dx.doi.org/10.1142/s0218126613500229.
Full textYuan, Xingliang, Jian Weng, Cong Wang, and Kui Ren. "Secure Integrated Circuit Design via Hybrid Cloud." IEEE Transactions on Parallel and Distributed Systems 29, no. 8 (2018): 1851–64. http://dx.doi.org/10.1109/tpds.2018.2807844.
Full textStorace, M. "Secure communication by hysteresis-based chaotic circuit." Electronics Letters 34, no. 11 (1998): 1077. http://dx.doi.org/10.1049/el:19980796.
Full textFang, Xin, Stratis Ioannidis, and Miriam Leeser. "SIFO: Secure Computational Infrastructure Using FPGA Overlays." International Journal of Reconfigurable Computing 2019 (December 6, 2019): 1–18. http://dx.doi.org/10.1155/2019/1439763.
Full textAlibeigi, Iman, Abdolah Amirany, Ramin Rajaei, Mahmoud Tabandeh, and Saeed Bagheri Shouraki. "A Low-Cost Highly Reliable Spintronic True Random Number Generator Circuit for Secure Cryptography." SPIN 10, no. 01 (2019): 2050003. http://dx.doi.org/10.1142/s2010324720500034.
Full textXiong, Li, Zhenlai Liu, and Xinguo Zhang. "Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System." Complexity 2017 (2017): 1–23. http://dx.doi.org/10.1155/2017/4962739.
Full textDing, Hangchao, Han Jiang, and Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE." Security and Communication Networks 2021 (September 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Full textCarter, Henry, Benjamin Mood, Patrick Traynor, and Kevin Butler. "Secure outsourced garbled circuit evaluation for mobile devices." Journal of Computer Security 24, no. 2 (2016): 137–80. http://dx.doi.org/10.3233/jcs-150540.
Full textRiazi, M. Sadegh, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. "Toward Practical Secure Stable Matching." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 62–78. http://dx.doi.org/10.1515/popets-2017-0005.
Full textXiong, Li, Zhenlai Liu, and Xinguo Zhang. "Analysis, circuit implementation and applications of a novel chaotic system." Circuit World 43, no. 3 (2017): 118–30. http://dx.doi.org/10.1108/cw-02-2017-0007.
Full textLi, Shih-Yu, Cheng-Hsiung Yang, Chin-Teng Lin, Li-Wei Ko, and Tien-Ting Chiu. "Chaotic Motions in the Real Fuzzy Electronic Circuits." Abstract and Applied Analysis 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/875965.
Full textKocamaz, Uğur Erkin, Serdar Çiçek, and Yılmaz Uyaroğlu. "Secure Communication with Chaos and Electronic Circuit Design Using Passivity-Based Synchronization." Journal of Circuits, Systems and Computers 27, no. 04 (2017): 1850057. http://dx.doi.org/10.1142/s0218126618500573.
Full textCaponetto, Riccardo, Luigi Fortuna, Luigi Occhipinti, and Maria Gabriella Xibilia. "SC-CNNs for Chaotic Signal Applications in Secure Communication Systems." International Journal of Neural Systems 13, no. 06 (2003): 461–68. http://dx.doi.org/10.1142/s0129065703001777.
Full textSprott, J. C., and W. J. Thio. "A Chaotic Circuit for Producing Gaussian Random Numbers." International Journal of Bifurcation and Chaos 30, no. 08 (2020): 2050116. http://dx.doi.org/10.1142/s0218127420501163.
Full textYANG, TAO, and LEON O. CHUA. "CHAOTIC IMPULSE RADIO: A NOVEL CHAOTIC SECURE COMMUNICATION SYSTEM." International Journal of Bifurcation and Chaos 10, no. 02 (2000): 345–57. http://dx.doi.org/10.1142/s0218127400000220.
Full textZhou, Jichao, Bong-Jo Shin, and Han-Jung Song. "Chaotic Circuit with Voltage Controllability for Secure Communication Applications." Journal of the Korea Academia-Industrial cooperation Society 13, no. 9 (2012): 4159–64. http://dx.doi.org/10.5762/kais.2012.13.9.4159.
Full textGhosh, Swaroop, Abhishek Basak, and Swarup Bhunia. "How Secure Are Printed Circuit Boards Against Trojan Attacks?" IEEE Design & Test 32, no. 2 (2015): 7–16. http://dx.doi.org/10.1109/mdat.2014.2347918.
Full textKOCAREV, Lj, K. S. HALLE, K. ECKERT, L. O. CHUA, and U. PARLITZ. "EXPERIMENTAL DEMONSTRATION OF SECURE COMMUNICATIONS VIA CHAOTIC SYNCHRONIZATION." International Journal of Bifurcation and Chaos 02, no. 03 (1992): 709–13. http://dx.doi.org/10.1142/s0218127492000823.
Full textKim, Hyungseup, Youngwoon Ko, Yeongjin Mun, et al. "Secure circuit with optical energy harvesting against unpowered physical attacks." Computers & Electrical Engineering 70 (August 2018): 74–82. http://dx.doi.org/10.1016/j.compeleceng.2018.06.005.
Full textAlam, Masoom, Naina Emmanuel, Tanveer Khan, et al. "Secure policy execution using reusable garbled circuit in the cloud." Future Generation Computer Systems 87 (October 2018): 488–501. http://dx.doi.org/10.1016/j.future.2017.12.067.
Full textIrimiciuc, Stefan-Andrei, Ovidiu Vasilovici, and Dan-Gheorghe Dimitriu. "Chua's Circuit: Control and Synchronization." International Journal of Bifurcation and Chaos 25, no. 04 (2015): 1550050. http://dx.doi.org/10.1142/s0218127415500509.
Full textKILIÇ, RECAI, MUSTAFA ALÇI, and ENIS GÜNAY. "A SC–CNN-BASED CHAOTIC MASKING SYSTEM WITH FEEDBACK." International Journal of Bifurcation and Chaos 14, no. 01 (2004): 245–56. http://dx.doi.org/10.1142/s0218127404009120.
Full textWANG, SHIU-PING, SENG-KIN LAO, HSIEN-KENG CHEN, JUHN-HORNG CHEN, and SHIH-YAO CHEN. "IMPLEMENTATION OF THE FRACTIONAL-ORDER CHEN–LEE SYSTEM BY ELECTRONIC CIRCUIT." International Journal of Bifurcation and Chaos 23, no. 02 (2013): 1350030. http://dx.doi.org/10.1142/s0218127413500302.
Full textCHUA, LEON O. "CHUA’S CIRCUIT: AN OVERVIEW TEN YEARS LATER." Journal of Circuits, Systems and Computers 04, no. 02 (1994): 117–59. http://dx.doi.org/10.1142/s0218126694000090.
Full textSahin, Muhammet Emin, Hasan Guler, and Serdar Ethem Hamamci. "Design and Realization of a Hyperchaotic Memristive System for Communication System on FPGA." Traitement du Signal 37, no. 6 (2020): 939–53. http://dx.doi.org/10.18280/ts.370607.
Full textChen, Heng, Teng Fei Lei, Jing Meng, and Rong Wang. "A New Autonomous Chaotic System and its Circuit Simulation." Advanced Materials Research 986-987 (July 2014): 1726–29. http://dx.doi.org/10.4028/www.scientific.net/amr.986-987.1726.
Full textChen, Ethan, and Vanessa Chen. "Statistical RF/Analog Integrated Circuit Design Using Combinatorial Randomness for Hardware Security Applications." Mathematics 8, no. 5 (2020): 829. http://dx.doi.org/10.3390/math8050829.
Full textA. Khare, Ankur, Piyush B. Shukla, and Sanjay C. Silakari. "Secure and Fast Chaos based Encryption System using Digital Logic Circuit." International Journal of Computer Network and Information Security 6, no. 6 (2014): 25–33. http://dx.doi.org/10.5815/ijcnis.2014.06.04.
Full textChen, Hsin-Chieh, Ben-Yi Liau, and Yi-You Hou. "Hardware Implementation of Lorenz Circuit Systems for Secure Chaotic Communication Applications." Sensors 13, no. 2 (2013): 2494–505. http://dx.doi.org/10.3390/s130202494.
Full textZheng, Yan, Ruchuan Wang, Hong Mu, and Haiyan Wang. "A secure model for mobile agent based on encrypted circuit construction." Frontiers of Electrical and Electronic Engineering in China 2, no. 2 (2007): 176–81. http://dx.doi.org/10.1007/s11460-007-0033-8.
Full textZhang, Mingwu, Yi Mu, Jian Shen, and Xinyi Huang. "Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity." Security and Communication Networks 9, no. 12 (2016): 1737–47. http://dx.doi.org/10.1002/sec.1435.
Full textKim, Eunro, Inseok Yang, and Dongik Lee. "Time-Delay Robust Nonlinear Dynamic Inversion for Chaos Synchronization with Application to Secure Communications." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/651950.
Full textCHEN, XIU-BO, QIAO-YAN WEN, FEN-ZHUO GUO, YING SUN, GANG XU, and FU-CHEN ZHU. "CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE." International Journal of Quantum Information 06, no. 04 (2008): 899–906. http://dx.doi.org/10.1142/s0219749908004195.
Full textKim, Bruce, and Sang-Bock Cho. "A Secure Tunable LNA Design for Internet of Things." International Symposium on Microelectronics 2017, no. 1 (2017): 000705–8. http://dx.doi.org/10.4071/isom-2017-thp22_138.
Full textLi, Dan, Ying Qing Xia, Peng Jun He, and Juan Xiao. "The Design of Contactless IC Card Reader in ETC." Applied Mechanics and Materials 229-231 (November 2012): 1564–67. http://dx.doi.org/10.4028/www.scientific.net/amm.229-231.1564.
Full textLÜ, JINHU, and GUANRONG CHEN. "GENERATING MULTISCROLL CHAOTIC ATTRACTORS: THEORIES, METHODS AND APPLICATIONS." International Journal of Bifurcation and Chaos 16, no. 04 (2006): 775–858. http://dx.doi.org/10.1142/s0218127406015179.
Full textWang, Jing, Wenxin Yu, Junnian Wang, Yanming Zhao, Jing Zhang, and Dan Jiang. "A new six‐dimensional hyperchaotic system and its secure communication circuit implementation." International Journal of Circuit Theory and Applications 47, no. 5 (2019): 702–17. http://dx.doi.org/10.1002/cta.2617.
Full textChen, Zhimin, Ambuj Sinha, and Patrick Schaumont. "Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks." IEEE Transactions on Computers 62, no. 1 (2013): 124–36. http://dx.doi.org/10.1109/tc.2011.225.
Full textSambas, Aceng, Mustafa Mamat, Mada Sanjaya W.S., Zabidin Salleh, and Fatma Susilawati Mohamad. "Unidirectional synchronization of Jerk circuit and it’s uses in secure communication system." Advanced Studies in Theoretical Physics 9 (2015): 545–57. http://dx.doi.org/10.12988/astp.2015.5229.
Full textCHIDA, K., G. YAMAMOTO, K. SUZUKI, et al. "Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (2007): 128–38. http://dx.doi.org/10.1093/ietfec/e90-a.1.128.
Full textTanimura, K., and N. D. Dutt. "HDRL: Homogeneous Dual-Rail Logic for DPA Attack Resistive Secure Circuit Design." IEEE Embedded Systems Letters 4, no. 3 (2012): 57–60. http://dx.doi.org/10.1109/les.2012.2193115.
Full textKrishnan, Rajesh, and Ravi Sundaram. "Secure and scalable match: overcoming the universal circuit bottleneck using group programs." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 244–62. http://dx.doi.org/10.1515/popets-2015-0013.
Full textBian, YuYan, and WenXin Yu. "A secure communication method based on 6-D hyperchaos and circuit implementation." Telecommunication Systems 77, no. 4 (2021): 731–51. http://dx.doi.org/10.1007/s11235-021-00790-1.
Full textFilipova-Petrakieva, S. K., and Y. M. Shopov. "Electrical Device Protection from Overvoltage in a DC Power Supply Network: Fast-acting Protection, Realized by an “Artificial” Short Circuit in the Input of the Protected Device." Engineering, Technology & Applied Science Research 10, no. 1 (2020): 5314–19. http://dx.doi.org/10.48084/etasr.3316.
Full textKOZLOV, ALEXANDER K., VLADIMIR D. SHALFEEV, and LEON O. CHUA. "EXACT SYNCHRONIZATION OF MISMATCHED CHAOTIC SYSTEMS." International Journal of Bifurcation and Chaos 06, no. 03 (1996): 569–80. http://dx.doi.org/10.1142/s0218127496000266.
Full textMouchet, Christian, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. "Multiparty Homomorphic Encryption from Ring-Learning-with-Errors." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 291–311. http://dx.doi.org/10.2478/popets-2021-0071.
Full textAhmad, Firdous, M. Mustafa, Nisar Ahmad Wani, and Feroz A. Mir. "A novel idea of pseudo-code generator in quantum-dot cellular automata (QCA)." International Journal for Simulation and Multidisciplinary Design Optimization 5 (2014): A04. http://dx.doi.org/10.1051/smdo/2013012.
Full text