Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,795 papers from all fields of science
Search
Sign In
Create Free Account
SBCS
Known as:
Single byte
, SCS
, Singlebytes
Expand
SBCS, or Single Byte Character Set, is used to refer to character encodings that use exactly one byte for each graphic character. An SBCS can…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Byte
CCSID
Character encoding
Code page
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models
Pei Luo
,
Konstantinos Athanasiou
,
Yunsi Fei
,
T. Wahl
IEEE Transactions on Information Forensics and…
2018
Corpus ID: 4570982
As the new hash standard, Keccak-based secure hash function (SHA-3) will be used in various cryptographic applications. Its…
Expand
Highly Cited
2013
Highly Cited
2013
Recomputing with Permuted Operands: A Concurrent Error Detection Approach
Xiaofei Guo
,
R. Karri
IEEE Transactions on Computer-Aided Design of…
2013
Corpus ID: 795564
Naturally occurring and maliciously injected faults reduce the reliability of cryptographic hardware and may leak confidential…
Expand
2009
2009
Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEG
Kamaruddin Malik Bin Mohamad
,
M. M. Deris
Fifth International Joint Conference on INC, IMS…
2009
Corpus ID: 8147814
Header and footer detection is important in digital investigation for file type detection. The use of efficient algorithm to…
Expand
Highly Cited
2008
Highly Cited
2008
Subverting the Xen hypervisor
Rafal Wojtczuk
2008
Corpus ID: 9488649
This paper outlines the recent work by the author to design and develop a backdoor for machines running the Xen hypervisor. An…
Expand
Highly Cited
2008
Highly Cited
2008
Self-brand connections: The role of attitude strength and autobiographical memory primes
David J. Moore
,
P. Homer
2008
Corpus ID: 205759013
Highly Cited
2007
Highly Cited
2007
Commercial Lending Distance and Historically Underserved Areas
Robert DeYoung
,
W. Frame
,
D. Glennon
,
D. McMillen
,
P.eter J Nigro
2007
Corpus ID: 29199163
We study recent changes in the geographic distances between small businesses and their bank lenders, using a large random sample…
Expand
Highly Cited
2007
Highly Cited
2007
A Performance Study on Different Cost Aggregation Approaches Used in Real-Time Stereo Matching
Minglun Gong
,
Ruigang Yang
,
Liang Wang
,
Mingwei Gong
International Journal of Computer Vision
2007
Corpus ID: 16232675
Many vision applications require high-accuracy dense disparity maps in real-time and online. Due to time constraint, most real…
Expand
Highly Cited
2005
Highly Cited
2005
A 2-nW 1.1-V self-biased current reference in CMOS technology
Edgar Mauricio Camacho-Galeano
,
C. Galup-Montoro
,
M. C. Schneider
IEEE Transactions on Circuits and Systems - II…
2005
Corpus ID: 16808070
This work presents the design of an ultra-low-power self-biased 400-pA current source. We propose the use of a very simple…
Expand
Highly Cited
2003
Highly Cited
2003
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures
Chien-Ning Chen
,
Sung-Ming Yen
Australasian Conference on Information Security…
2003
Corpus ID: 16455357
This paper describes a DFA attack on the AES key schedule. This fault model assumes that the attacker can induce a single byte…
Expand
Highly Cited
1999
Highly Cited
1999
Statistical properties of piecewise smooth hyperbolic systems in high dimensions
N. Chernov
1999
Corpus ID: 14053036
We study smooth hyperbolic systems with singularities and their SRB measures. Here we assume that the singularities are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE