Sciweavers

268 search results - page 18 / 54
» A Statistical Attack on RC6
Sort
View
DEPCOS
2008
IEEE
156views Hardware» more  DEPCOS 2008»
14 years 1 months ago
A True Random Number Generator with Built-in Attack Detection
True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. Metastability is a way to generate true random numbers. By using electromag...
Bernhard Fechner, Andre Osterloh
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao
ICMCS
2007
IEEE
134views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Cryptanalysis of a Video Scrambling Based on Space Filling Curves
In this paper, we study the security of an image scrambling algorithm based on Space-Filling Curves (SFC). A random SFC is a pixel permutation that changes the scanning order with...
Ayoub Massoudi, Frédéric Lefè...
ACSC
2005
IEEE
14 years 1 months ago
Simulating Network Robustness for Critical Infrastructure Networks
We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Anthony H. Dekker
JOC
2011
94views more  JOC 2011»
12 years 10 months ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...