Sciweavers

217 search results - page 24 / 44
» Selecting Cryptographic Key Sizes
Sort
View
DATE
2003
IEEE
65views Hardware» more  DATE 2003»
14 years 1 months ago
Masking the Energy Behavior of DES Encryption
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has d...
Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T....
CSDA
2006
98views more  CSDA 2006»
13 years 8 months ago
Fast estimation algorithm for likelihood-based analysis of repeated categorical responses
Likelihood-based marginal regression modelling for repeated, or otherwise clustered, categorical responses is computationally demanding. This is because the number of measures nee...
Jukka Jokinen
ASIACRYPT
2003
Springer
14 years 1 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
DMDW
2000
151views Management» more  DMDW 2000»
13 years 9 months ago
Automated dimensionality reduction of data warehouses
A data warehouse is designed to consolidate and maintain all attributes that are relevant for the analysis processes. Due to the rapid increase in the size of the modern operation...
Mark Last, Oded Maimon
MVA
2000
234views Computer Vision» more  MVA 2000»
13 years 7 months ago
An automatic assessment scheme for steel quality inspection
This paper presents an automatic system for steel quality assessment, by measuring textural properties of carbide distributions. In current steel inspection, specially etched and p...
Klaus Wiltschi, Axel Pinz, Tony Lindeberg