Sciweavers

BMCBI
2016
50views more  BMCBI 2016»
10 years 1 months ago
CP-CHARM: segmentation-free image classification made accessible
Background: Automated classification using machine learning often relies on features derived from segmenting individual objects, which can be difficult to automate. WND-CHARM is a...
Virginie Uhlmann, Shantanu Singh, Anne E. Carpente...
BMCBI
2016
60views more  BMCBI 2016»
10 years 1 months ago
MetaCRAM: an integrated pipeline for metagenomic taxonomy identification and compression
Background: Metagenomics is a genomics research discipline devoted to the study of microbial communities in environmental samples and human and animal organs and tissues. Sequence...
MinJi Kim, Xiejia Zhang, Jonathan G. Ligo, Farzad ...


views
56 years 4 months ago
BIRTHDAY
2016
Springer
10 years 1 months ago
Improving the Big Mac Attack on Elliptic Curve Cryptography
Abstract. At CHES 2001, Walter introduced the Big Mac attack against an implementation of rsa. It is an horizontal collision attack, based on the detection of common operands in tw...
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvor...
BIRTHDAY
2016
Springer
10 years 1 months ago
Buying AES Design Resistance with Speed and Energy
Rodrigo Portella do Canto, Roman Korkikian, David ...
BIRTHDAY
2016
Springer
10 years 1 months ago
Abstract Interpretation of PEPA Models
Stephen Gilmore, Jane Hillston, Natalia Zon
BIRTHDAY
2016
Springer
10 years 1 months ago
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
Companies as well as individual users are adopting cloud solutions at an over-increasing rate for storing data and making them accessible to others. While migrating data to the clo...
Sabrina De Capitani di Vimercati, Sara Foresti, Gi...
BIRTHDAY
2016
Springer
10 years 1 months ago
Dual EC: A Standardized Back Door
Abstract. Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generat...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
BIRTHDAY
2016
Springer
10 years 1 months ago
Double-Speed Barrett Moduli
Modular multiplication and modular reduction are the atomic constituents of most public-key cryptosystems. Amongst the numerous algorithms for performing these operations, a partic...
Rémi Géraud, Diana Maimut, David Nac...