Sciweavers

3116 search results - page 57 / 624
» Recovering
Sort
View
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
14 years 2 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
14 years 2 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
14 years 1 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen
TELETRAFFIC
2007
Springer
14 years 1 months ago
Performance Analysis of Peer-to-Peer Storage Systems
This paper evaluates the performance of two schemes for recovering lost data in a peer-to-peer (P2P) storage systems. The first scheme is centralized and relies on a server that r...
Sara Alouf, Abdulhalim Dandoush, Philippe Nain
WAPCV
2007
Springer
14 years 1 months ago
Modeling the Dynamics of Feature Binding During Object-Selective Attention
We present a biologically plausible computational model for solving the visual feature binding problem. The binding problem appears to be due to the distributed nature of visual pr...
Albert L. Rothenstein, John K. Tsotsos