Sciweavers

2028 search results - page 3 / 406
» Differential Power Analysis Model and Some Results
Sort
View
JCS
2010
80views more  JCS 2010»
13 years 5 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
EIT
2008
IEEE
14 years 20 days ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
14 years 2 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
BMCBI
2008
154views more  BMCBI 2008»
13 years 11 months ago
Bayesian models and meta analysis for multiple tissue gene expression data following corticosteroid administration
Background: This paper addresses key biological problems and statistical issues in the analysis of large gene expression data sets that describe systemic temporal response cascade...
Yulan Liang, Arpad Kelemen
BMCBI
2005
107views more  BMCBI 2005»
13 years 10 months ago
Identifying differential expression in multiple SAGE libraries: an overdispersed log-linear model approach
Background: In testing for differential gene expression involving multiple serial analysis of gene expression (SAGE) libraries, it is critical to account for both between and with...
Jun Lu, John K. Tomfohr, Thomas B. Kepler