Sciweavers

2259 search results - page 118 / 452
» Separation and information hiding
Sort
View
HOST
2008
IEEE
14 years 4 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
SIGCSE
2010
ACM
166views Education» more  SIGCSE 2010»
13 years 10 months ago
Introducing concurrency in CS 1
Because of the growing importance of concurrent programming, many people are trying to figure out where in the curriculum to introduce students to concurrency. In this paper we di...
Kim B. Bruce, Andrea Pohoreckyj Danyluk, Thomas P....
ICASSP
2010
IEEE
13 years 10 months ago
Limited feedback with joint CSI quantization for multicell cooperative generalized eigenvector beamforming
Existing work on limited feedback for cooperative multicell beamforming quantizes the desired and interfering channel state information (CSI) using separate codebooks. In this pap...
Ramya Bhagavatula, Robert W. Heath Jr., Bhaskar D....
MST
2008
94views more  MST 2008»
13 years 10 months ago
Partial Bi-immunity, Scaled Dimension, and NP-Completeness
The Turing and many-one completeness notions for NP have been previously separated under measure, genericity, and bi-immunity hypotheses on NP. The proofs of all these results rel...
John M. Hitchcock, Aduri Pavan, N. V. Vinodchandra...