SBCS

Known as: Single byte, SCS, Singlebytes 
SBCS, or Single Byte Character Set, is used to refer to character encodings that use exactly one byte for each graphic character. An SBCS can… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1975-2018
051019752018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In most modern systems, the memory subsystem is managed and accessed at multiple different granularities (e.g., words, cache… (More)
Is this relevant?
2013
2013
Naturally occurring and maliciously injected faults reduce the reliability of cryptographic hardware and may leak confidential… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Naturally occurring and maliciously injected faults reduce the reliability of Advanced Encryption Standard (AES) and may leak… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
  • Rafal Wojtczuk
  • 2008
This paper outlines the recent work by the author to design and develop a backdoor for machines running the Xen hypervisor. An… (More)
  • figure 1
Is this relevant?
2007
2007
Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Write operations in flash memory should be preceded by erase operations, which take an order of magnitude longer than writes… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper we analyze the statistical distribution of the keystream generator used by the stream ciphers RC4 and RC4A. Our… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Conventional operating system code is written to deal with all possible system states, and performs considerable interpretation… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1982
Highly Cited
1982
In the course of a concurrent computation, processes P1,..., Pn must reach a common choice of one out of k alternatives A 1… (More)
Is this relevant?