Sciweavers

126 search results - page 5 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
PDC
2004
ACM
14 years 5 days ago
Examining a planning discourse: how a manager represents issues within a planning frame and how the others could do the same
The aim of Participatory Design (PD) is to involve the users in the design. Even though the research has shown the success of PD projects in empowering users, little has been said...
Jarmo Sarkkinen
JDCTA
2010
175views more  JDCTA 2010»
13 years 1 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
WISEC
2009
ACM
14 years 1 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
AFRICACRYPT
2009
Springer
14 years 1 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...
DESRIST
2009
Springer
79views Education» more  DESRIST 2009»
13 years 11 months ago
Power of peripheral designers: how users learn to design
In information system development, end-users often participate in design and in many cases learn to design their own system. Design, however, requires a distinct approach that use...
Yutaka Yamauchi