Sciweavers

257 search results - page 44 / 52
» Breaking Value Symmetry
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 29 days ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
HAPTICS
2003
IEEE
14 years 26 days ago
The Haptic Probe: Mechanized Haptic Exploration and Automated Modeling
It seems likely that humans build internal models of objects that they explore haptically, and that the complexity of an internal model is not necessarily associated with complex ...
Volkan Patoglu, R. Brent Gillespie
ASIACRYPT
2003
Springer
14 years 24 days ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
KDID
2004
481views Database» more  KDID 2004»
13 years 9 months ago
Models and Indices for Integrating Unstructured Data with a Relational Database
Abstract. Database systems are islands of structure in a sea of unstructured data sources. Several real-world applications now need to create bridges for smooth integration of semi...
Sunita Sarawagi
DEXA
2010
Springer
177views Database» more  DEXA 2010»
13 years 8 months ago
Enhanced Foundry Production Control
Mechanical properties are the attributes that measure the faculty of a metal to withstand several loads and tensions. Specifically, ultimate tensile strength is the force a materia...
Javier Nieves, Igor Santos, Yoseba K. Penya, Felix...