Searched for: +
(1 - 2 of 2)
document
Kok, Jim (author)
Analysing physical leakages (e.g. power consumption and electromagnetic radiation) of cryptographic devices can be used by adversaries to extract secret keys. Over the last couple of years, researchers have shown that machine learning has potential for this process. Machine learning models need to be fine-tuned to enhance key extraction...
bachelor thesis 2020
document
Nugroho, H. (author)
Optical beamforming networks (OBFNs), which consist of many small and flat antennas, called phased array antennas (PAAs), can be tuned such that the signal beam from the airplanes can be steered towards a satellite. This was proposed as a alternative to the mechanically steered antenna, which has many disadvantages. The problem of tuning a large...
master thesis 2015