Sciweavers

4101 search results - page 576 / 821
» Differential Power Analysis
Sort
View
ICPPW
2002
IEEE
14 years 3 months ago
Near-Optimal Loop Tiling by Means of Cache Miss Equations and Genetic Algorithms
The effectiveness of the memory hierarchy is critical for the performance of current processors. The performance of the memory hierarchy can be improved by means of program transf...
Jaume Abella, Antonio González, Josep Llosa...
SIGMETRICS
2010
ACM
227views Hardware» more  SIGMETRICS 2010»
14 years 3 months ago
Characterizing and modeling user activity on smartphones: summary
In this paper, we present a comprehensive analysis of real smartphone usage during a 6-month study of real user activity on the Android G1 smartphone. Our goal is to study the hig...
Alex Shye, Benjamin Scholbrock, Gokhan Memik, Pete...
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
14 years 3 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
COLCOM
2009
IEEE
14 years 3 months ago
Learning communities supported by autonomic recommendation mechanism
- Peer-to-peer (P2P) offers good solutions for many applications such as large data sharing and collaboration. Thus, it appears as a powerful paradigm to develop scalable distribut...
Stainam N. Brandao, Ricardo T. Silva, Jano M. Souz...
WISA
2009
Springer
14 years 3 months ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar