Sciweavers

1369 search results - page 28 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
APCCAS
2006
IEEE
323views Hardware» more  APCCAS 2006»
14 years 1 months ago
Real-Time Implementation of a Particle Filter with Integrated Voice Activity Detector for Acoustic Speaker Tracking
— In noisy and reverberant environments, the problem of acoustic source localisation and tracking (ASLT) using an array of microphones presents a number of challenging difficult...
Anders M. Johansson, Eric A. Lehmann, Sven Nordhol...
CCS
2005
ACM
14 years 1 months ago
Misbehaving TCP receivers can cause internet-wide congestion collapse
An optimistic acknowledgment (opt-ack) is an acknowledgment sent by a misbehaving client for a data segment that it has not received. Whereas previous work has focused on opt-ack ...
Rob Sherwood, Bobby Bhattacharjee, Ryan Braud
ICASSP
2007
IEEE
14 years 1 months ago
A Real-Time SRP-PHAT Source Location Implementation using Stochastic Region Contraction(SRC) on a Large-Aperture Microphone Arra
In most microphone array applications, it is essential to localize sources in a noisy, reverberant environment. It has been shown that computing the steered response power(SRP) is...
Hoang Do, Harvey F. Silverman, Ying Yu
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 2 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...