Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,690,515 papers from all fields of science
Search
Sign In
Create Free Account
Hamming weight
Known as:
Popcnt
, Popcount
The Hamming weight of a string is the number of symbols that are different from the zero-symbol of the alphabet used. It is thus equivalent to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARM architecture
Bar product
Bent function
Binary Golay code
Expand
Broader (1)
Coding theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
How to make a linear network code (strongly) secure
K. Kurosawa
,
Hiroyuki Ohta
,
Kenji Kakuta
Designs, Codes and Cryptography
2016
Corpus ID: 36283994
A linear network code is called k-secure if it is secure even if an adversary eavesdrops at most k edges. In this paper, we show…
Expand
2015
2015
Power analysis attacks on ARX: An application to Salsa20
Bodhisatwa Mazumdar
,
Subidh Ali
,
O. Sinanoglu
IEEE International Symposium on On-Line Testing…
2015
Corpus ID: 10056265
In this paper, we analyze the vulnerability of Salsa20 stream cipher against power analysis attacks, especially against…
Expand
2011
2011
On the (in)security of two Joint Encryption and Error Correction schemes
Qi Chai
,
G. Gong
Int. J. Secur. Networks
2011
Corpus ID: 6357655
Joint Encryption and Error Correction (JEEC) is proposed to combine encoding/encryption as one process to boost more compact…
Expand
2008
2008
Information Leakage of Flip-Flops in DPA-Resistant Logic Styles
A. Moradi
,
T. Eisenbarth
,
+4 authors
M. Salmasizadeh
IACR Cryptology ePrint Archive
2008
Corpus ID: 16194387
This contribution discusses the information leakage of flipflops for different DPA-resistant logic styles. We show that many of…
Expand
Highly Cited
2004
Highly Cited
2004
Data retention reliability model of NROM nonvolatile memory products
M. Janai
,
B. Eitan
,
A. Shappir
,
E. Lusky
,
I. Bloom
,
G. Cohen
IEEE transactions on device and materials…
2004
Corpus ID: 28123511
Post cycling data retention reliability model of NROM devices is presented. The degradation rate of the threshold voltage of…
Expand
2003
2003
Principal and Independent Component Analysis for Crypto-systems with Hardware Unmasked Units
Lilian Bohy
,
M. Neve
,
David Samyde
,
J. Quisquater
2003
Corpus ID: 17943162
Principal component analysis (PCA) is a well-known statis- tical method for reducing the dimension of a data set. This method…
Expand
2000
2000
Constructions of ternary constant-composition codes with weight three
M. Svanström
IEEE Transactions on Information Theory
2000
Corpus ID: 38292391
1999
1999
Extremal double circulant Type II codes over Z4 and construction of 5-(24, 10, 36) designs
T. Gulliver
,
M. Harada
Discrete Mathematics
1999
Corpus ID: 26780261
1996
1996
On the weight distribution of linear block codes formed from convolutional codes
J. Wolf
,
A. Viterbi
IEEE Transactions on Communications
1996
Corpus ID: 46410170
We explain how to obtain the weight enumerator and the performance of linear block codes formed in several distinct ways from a…
Expand
1995
1995
Some new results for ternary linear codes of dimension 5 and 6
M. Eupen
IEEE Transactions on Information Theory
1995
Corpus ID: 8200026
It is proved that ternary codes with parameters [40,5,25] and [148,5,98] do not exist. A new ternary code is constructed with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required