Sciweavers

230 search results - page 19 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
ICIP
2009
IEEE
14 years 8 months ago
Optimum Kernel Function Design From Scale Space Features For Object Detection
Scale-space representation of an image is a significant way to generate features for classification. However, for a specific classification task, the entire scale-space may not be...
ICCAD
2005
IEEE
107views Hardware» more  ICCAD 2005»
14 years 4 months ago
Projection-based performance modeling for inter/intra-die variations
Large-scale process fluctuations in nano-scale IC technologies suggest applying high-order (e.g., quadratic) response surface models to capture the circuit performance variations....
Xin Li, Jiayong Le, Lawrence T. Pileggi, Andrzej J...
JSYML
2008
66views more  JSYML 2008»
13 years 7 months ago
Special groups whose isometry relation is a finite union of cosets
0-stable 0-categorical linked quaternionic mappings are studied and are shown to correspond (in some sense) to special groups which are 0stable, 0-categorical, satisfy AP(3) and ha...
Vincent Astier
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 2 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 28 days ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...