Sciweavers

281 search results - page 27 / 57
» Non-black-box Techniques in Cryptography
Sort
View
CHES
2009
Springer
192views Cryptology» more  CHES 2009»
14 years 10 months ago
CDs Have Fingerprints Too
Abstract. We introduce a new technique for extracting unique fingerprints from identical CDs. The proposed technique takes advantage of manufacturing variability found in the lengt...
Ghaith Hammouri, Aykutlu Dana, Berk Sunar
SIBGRAPI
2007
IEEE
14 years 4 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
14 years 3 months ago
Messin' with Texas Deriving Mother's Maiden Names Using Public Records
We have developed techniques to automatically infer mother's maiden names from public records. We demonstrate our techniques using publicly available records from the state o...
Virgil Griffith, Markus Jakobsson
ICCAD
2002
IEEE
189views Hardware» more  ICCAD 2002»
14 years 6 months ago
Reversible logic circuit synthesis
Reversible, or information-lossless, circuits have applications in digital signal processing, communication, computer graphics and cryptography. They are also a fundamental requir...
Vivek V. Shende, Aditya K. Prasad, Igor L. Markov,...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 4 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov