Sciweavers

257 search results - page 45 / 52
» Breaking Value Symmetry
Sort
View
JCS
2008
93views more  JCS 2008»
13 years 7 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JSS
2006
66views more  JSS 2006»
13 years 7 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
MR
2002
62views Robotics» more  MR 2002»
13 years 7 months ago
Impact of circuit resistance on the breakdown voltage of tantalum chip capacitors
Experiments are described in this paper whose results suggest a clear mathematical relationship between total circuit resistance (including the capacitor's ESR) and the volta...
Erik K. Reed, Jonathan L. Paulsen
INDOCRYPT
2010
Springer
13 years 5 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
ISCA
2007
IEEE
90views Hardware» more  ISCA 2007»
14 years 1 months ago
Transparent control independence (TCI)
AL-ZAWAWI, AHMED SAMI. Transparent Control Independence (TCI). (Under the direction of Dr. Eric Rotenberg). Superscalar architectures have been proposed that exploit control indep...
Ahmed S. Al-Zawawi, Vimal K. Reddy, Eric Rotenberg...