Sciweavers

872 search results - page 34 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
ISCAS
2002
IEEE
114views Hardware» more  ISCAS 2002»
14 years 15 days ago
Lossless, near-lossless and lossy adaptive coding based on the lossless DCT
This report proposes a new coding method, which realizes lossless, near-lossless and lossy coding with a unified single algorithm. The method is based on a lifting-structured loss...
Somchart Chokchaitam, Masahiro Iwahashi
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai

Publication
715views
15 years 7 months ago
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
DAC
2004
ACM
14 years 8 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
IASTEDCCS
2004
107views Hardware» more  IASTEDCCS 2004»
13 years 9 months ago
Rapid steady-state analysis of CLL resonant power converters
Cyclic averaging techniques are applied to the CLL resonant power converter to provide steady-state converter characteristics for rapid stress analysis. This is shown to facilitat...
Carl Gould 0002, C. M. Bingham, D. A. Stone, M. P....