Sciweavers

923 search results - page 161 / 185
» Improved Slide Attacks
Sort
View
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 12 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CSE
2008
IEEE
13 years 11 months ago
ACN: An Associative Classifier with Negative Rules
Classification using association rules has added a new dimension to the ongoing research for accurate classifiers. Over the years, a number of associative classifiers based on pos...
Gourab Kundu, Md. Monirul Islam, Sirajum Munir, Md...
IMC
2007
ACM
13 years 11 months ago
On the impact of route monitor selection
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering realtime BGP updates from different networks. Many stud...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
CSREASAM
2008
13 years 11 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley
MEDIAFORENSICS
2010
13 years 11 months ago
Audio annotation watermarking with robustness against DA/AD conversion
In the paper we present a watermarking scheme developed to meet the specific requirements of audio annotation watermarking robust against DA/AD conversion (watermark detection aft...
Kun Qian, Christian Krätzer, Michael Biermann...