Sciweavers

23036 search results - page 4577 / 4608
» Sketching informal presentations
Sort
View
CASES
2010
ACM
13 years 8 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
EGH
2010
Springer
13 years 7 months ago
Texture compression of light maps using smooth profile functions
Light maps have long been a popular technique for visually rich real-time rendering in games. They typically contain smooth color gradients which current low bit rate texture comp...
Jim Rasmusson, Jacob Ström, Per Wennersten, M...
HUC
2010
Springer
13 years 7 months ago
Locaccino: a privacy-centric location sharing application
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researc...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
ICIP
2010
IEEE
13 years 7 months ago
Enhanced prediction for motion estimation in Scalable Video Coding
In this paper, we present a temporal candidate generation scheme that can be applied to motion estimators in Scalable Video Codecs (SVCs). For bidirectional motion estimation, usu...
Marijn J. H. Loomans, Cornelis J. Koeleman, Peter ...
INDOCRYPT
2010
Springer
13 years 7 months ago
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...
« Prev « First page 4577 / 4608 Last » Next »