Sciweavers

1340 search results - page 131 / 268
» JWARS output analysis
Sort
View
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
15 years 7 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin
EUROMICRO
1996
IEEE
15 years 8 months ago
Performance Analysis of Packet Switching Interconnection Networks with Finite Buffers
In thispaper,a mathematicalmethodfor analysis of synchronous packet-switching interconnection networks with jinite buffering capacity at the output of switching elements ispresent...
Aristotel Tentov, Aksenti L. Grnarov
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 8 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 7 months ago
Rate analysis for streaming applications with on-chip buffer constraints
While mapping a streaming (such as multimedia or network packet processing) application onto a specified architecture, an important issue is to determine the input stream rates tha...
Alexander Maxiaguine, Simon Künzli, Samarjit ...
VDA
2010
169views Visualization» more  VDA 2010»
15 years 6 months ago
Techniques for precision-based visual analysis of projected data
The analysis of high-dimensional data is an important, yet inherently difficult problem. Projection techniques such as PCA, MDS, and SOM can be used to map high-dimensional data t...
Tobias Schreck, Tatiana von Landesberger, Sebastia...