Sciweavers

534 search results - page 36 / 107
» Power from Random Strings
Sort
View
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
14 years 4 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
GLOBECOM
2006
IEEE
14 years 5 months ago
Sensor Localization from WLS Optimization with Closed-form Gradient and Hessian
— A non-parametric, low-complexity algorithm for accurate and simultaneous localization of multiple sensors from scarce and imperfect ranging information is proposed. The techniq...
Giuseppe Destino, Giuseppe Thadeu Freitas de Abreu
ICASSP
2011
IEEE
13 years 2 months ago
Causal signal recovery from U-invariant samples
Causal processing of a signal’s samples is crucial in on-line applications such as audio rate conversion, compression, tracking and more. This paper addresses the problem of cau...
Tomer Michaeli, Yonina C. Eldar, Volker Pohl
ICML
2004
IEEE
14 years 11 months ago
Training conditional random fields via gradient tree boosting
Conditional Random Fields (CRFs; Lafferty, McCallum, & Pereira, 2001) provide a flexible and powerful model for learning to assign labels to elements of sequences in such appl...
Thomas G. Dietterich, Adam Ashenfelter, Yaroslav B...
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
14 years 2 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou