Sciweavers

33356 search results - page 49 / 6672
» Models of Continual Computation
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
ICPR
2004
IEEE
14 years 11 months ago
Parameterisation Invariant Statistical Shape Models
In this paper novel theory to automate shape modelling is described. The main idea is to develop a theory that is intrinsically defined for curves, as opposed to a finite sample o...
Johan Karlsson, Anders Ericsson, Kalle Åstr&...