Sciweavers

60 search results - page 10 / 12
» Cellular Programming and Symmetric Key Cryptography Systems
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
Statistical Modeling of Co-Channel Interference
—With increasing spatial reuse of the radio spectrum, co-channel interference is becoming the dominant noise source and may severely degrade the communication performance of wire...
Kapil Gulati, Aditya Chopra, Brian L. Evans, Keith...
DAC
2008
ACM
13 years 9 months ago
Protecting bus-based hardware IP by secret sharing
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 4 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 29 days ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 1 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...