Sciweavers

650 search results - page 86 / 130
» Distorting symmetric designs
Sort
View
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 2 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to di...
François-Xavier Standaert, Siddika Berna &O...
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
14 years 1 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...
ICRA
2002
IEEE
95views Robotics» more  ICRA 2002»
14 years 1 months ago
Tendon Arrangement and Muscle Force Requirements for Humanlike Force Capabilities in a Robotic Finger
Human motion can provide a rich source of examples for use in robot grasping and manipulation. Adapting human examples to a robot manipulator is a difficult problem, however, in ...
Nancy S. Pollard, Richards C. Gilbert
ICCAD
1997
IEEE
129views Hardware» more  ICCAD 1997»
14 years 1 months ago
A fast and robust exact algorithm for face embedding
We present a new matrix formulation of the face hypercube embedding problem that motivates the design of an efficient search strategy to find an encoding that satisfies all fac...
Evguenii I. Goldberg, Tiziano Villa, Robert K. Bra...
NSDI
2008
13 years 11 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall