Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Glitch

Known as: Cartridge tilting, Computer glitch, Glitches 
A glitch is a short-lived fault in a system. It is often used to describe a transient fault that corrects itself, and is therefore difficult to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2019
Highly Cited
2019
  • L. T. Handoko
  • International Conference on Radar, Antenna…
  • 2019
  • Corpus ID: 211057168
 
  • figure 2-1
  • figure 2-4
  • table 2-1
  • figure 2-5
  • figure 2-6
Is this relevant?
2013
2013
This article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (aes) algorithm… Expand
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In representation theory of algebras the notion of 'mutation' often plays important roles, and two cases are well known, i.e… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper we propose a new Delay-PUF architecture that is expected to solve the current problem of Delay-PUF that it is easy… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Rotation-powered radio pulsars are generally observed to pulse regularly in the radio band, but this is not the case for so… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Monocular SLAM has the potential to turn inexpensive cameras into powerful pose sensors for applications such as robotics and… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Today's mobile phone is a pervasive tool. It has become such an important aspect of a user's daily life that it has moved from… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic… Expand
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?