Sciweavers

923 search results - page 7 / 185
» Improved Slide Attacks
Sort
View
VMV
2001
147views Visualization» more  VMV 2001»
13 years 11 months ago
Model-based 3-D Shape and Motion Estimation Using Sliding Textures
Given an accurate 3-D shape model of a scene, the motion parameters of a moving camera can be recovered with high accuracy using model-based motion estimation techniques. Shape er...
Eckehard G. Steinbach, Peter Eisert, Bernd Girod
AINA
2007
IEEE
14 years 4 months ago
On the Contribution of Preamble to Information Hiding in Mimicry Attacks
In this paper, we aim to determine the significance of different stages of an attack, namely the preamble and the exploit, on an achieved anomaly rate. To this end, we analyze fou...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
14 years 1 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...
EDBT
2006
ACM
194views Database» more  EDBT 2006»
14 years 10 months ago
On Concurrency Control in Sliding Window Queries over Data Streams
Abstract. Data stream systems execute a dynamic workload of longrunning and one-time queries, with the streaming inputs typically bounded by sliding windows. For efficiency, window...
Lukasz Golab, Kumar Gaurav Bijay, M. Tamer Öz...
ICCAD
2007
IEEE
137views Hardware» more  ICCAD 2007»
14 years 6 months ago
Analysis of large clock meshes via harmonic-weighted model order reduction and port sliding
— Clock meshes posses inherent low clock skews and excellent immunity to PVT variations, and have increasingly found their way to high-performance IC designs. However, analysis o...
Xiaoji Ye, Peng Li, Min Zhao, Rajendran Panda, Jia...