Learn More
BACKGROUND The resistance of Helicobacter pylori (H. pylori) to antibiotics is increasing worldwide, lowering its efficacy in current eradication therapies. This study evaluated H. pylori resistance to antibiotics in the southeast coastal region of China and suggests appropriate alternatives. MATERIALS AND METHODS Seventeen thousand seven hundred and(More)
Action: Functionality of the malicious hardware Modify functionality Leak secret information Action: Functionality of the malicious hardware Modify functionality Leak secret information Action: Functionality of the malicious hardware Modify functionality Leak secret information Assumptions Assumptions: Target device provides a high level of side channel(More)
— This paper explores a spectrally efficient, variable rate transmission scheme under a service outage constraint for a block fading channel model. The service outage constraint is motivated by real time variable rate applications. In a service outage, the transmission code rate is below a given basic rate and may in fact be zero. Unlike an information(More)
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circuit foundries to covertly implant malicious hardware Trojans into a genuine design. Hardware Trojans provide back doors for on-chip manipulation, or leak secret information off-chip(More)
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depends on minute uncontrollable process variations, a low supply voltage can benefit PUFs by providing high sensitivity to variations and low power consumption as well. Motivated by(More)
Throughput maximization of an adaptive transmission system with a finite number of transmitted power levels and code rates for communication over slow fading channels is analyzed based on the concept of information outage. Properties of throughput maximizing policies lead to an iterative algorithm that yields good system designs. Numerical results show that(More)
—Since the vulnerability of cryptosystems to differential power analysis (DPA) was reported in 1999, various power analysis attacks and corresponding countermeasures have been studied. With the scaling down of supply voltage and CMOS technology below 90nm, leakage power plays an increasing role in the overall power dissipation. Future cryptosystems need to(More)
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impact the data-dependent power of deep submicron cryptosystem designs. In this paper, we use Monte Carlo methods in SPICE circuit simulations to analyze the statistical properties of(More)