Sciweavers

4101 search results - page 22 / 821
» Differential Power Analysis
Sort
View
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 8 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
BMCBI
2007
104views more  BMCBI 2007»
13 years 7 months ago
Comparative evaluation of gene-set analysis methods
Background: Multiple data-analytic methods have been proposed for evaluating gene-expression levels in specific biological pathways, assessing differential expression associated w...
Qi Liu, Irina Dinu, Adeniyi J. Adewale, John D. Po...
GECCO
2007
Springer
326views Optimization» more  GECCO 2007»
14 years 1 months ago
Binary differential evolution for the unit commitment problem
The Unit Commitment Problem (UCP) is the task of finding an optimal turn on and turn off schedule for a group of power generation units over a given time horizon to minimize ope...
Ali Keles
AES
2004
Springer
80views Cryptology» more  AES 2004»
13 years 11 months ago
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES
The best upper bounds on the maximum expected linear probability (MELP) and the maximum expected differential probability
Liam Keliher
SIGGRAPH
1992
ACM
13 years 11 months ago
Generative modeling: a symbolic system for geometric modeling
This paper discusses a new, symbolic approach to geometric modeling called generative modeling. The approach allows specification, rendering, and analysis of a wide variety of sha...
John M. Snyder, James T. Kajiya