Sciweavers

7 search results - page 2 / 2
» Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code ...
Sort
View
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
13 years 9 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
AVBPA
2005
Springer
240views Biometrics» more  AVBPA 2005»
14 years 27 days ago
Practical Biometric Authentication with Template Protection
Abstract. In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. T...
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevena...