Sciweavers

89 search results - page 13 / 18
» Improved Side Channel Cube Attacks on PRESENT
Sort
View
ECIS
2000
13 years 9 months ago
Metadata-Based Integration of Qualitative and Quantitative Information Resources Approaching Knowledge Management
This paper presents a concept for the integration of quantitative and qualitative information sources with their accompanying management support functionalities from navigation and...
Bodo Rieger, Anja Kleber, Eitel von Maur
AMC
2005
116views more  AMC 2005»
13 years 7 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 1 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede
ICC
2009
IEEE
13 years 5 months ago
On the Interaction Between Channel Coding and Hierarchical Modulation
1 Classical systems using hierarchical modulation (such as DVB-SH) involve a "high-priority" (HP) and a "lowpriority" (LP) bit stream that are separately and in...
Seyed Mohammad Sajad Sadough, Pierre Duhamel