Sciweavers

247 search results - page 23 / 50
» A Self-healing Key Distribution Scheme with Novel Properties
Sort
View
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
14 years 5 months ago
Remote activation of ICs for piracy prevention and digital right management
— We introduce a remote activation scheme that aims to protect integrated circuits (IC) intellectual property (IP) against piracy. Remote activation enables designers to lock eac...
Yousra Alkabani, Farinaz Koushanfar, Miodrag Potko...
TOG
2012
172views Communications» more  TOG 2012»
11 years 11 months ago
Physical face cloning
We propose a complete process for designing, simulating, and fabricating synthetic skin for an animatronics character that mimics the face of a given subject and its expressions. ...
Bernd Bickel, Peter Kaufmann, Mélina Skoura...
ICASSP
2011
IEEE
13 years 17 days ago
A robust estimator and detector of circularity of complex signals
Recent research has revealed that circularity (or, propriety) of complex random signals can be exploited in developing optimal signal processors. In this paper, a robust estimator...
Esa Ollila, Visa Koivunen, H. Vincent Poor
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 11 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
ASIACRYPT
2003
Springer
14 years 2 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert