Sciweavers

168 search results - page 15 / 34
» Statistics and Secret Leakage
Sort
View
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 7 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
ISCAS
2006
IEEE
85views Hardware» more  ISCAS 2006»
14 years 1 months ago
Effective tunneling capacitance: a new metric to quantify transient gate leakage current
— In this paper we propose a new metric called “effective tunneling capacitance” (Ct eff ) to quantify the transient swing in the gate leakage (gate oxide tunneling) current ...
Elias Kougianos, Saraju P. Mohanty
VLSID
2007
IEEE
85views VLSI» more  VLSID 2007»
14 years 7 months ago
Metrics to Quantify Steady and Transient Gate Leakage in Nanoscale Transistors: NMOS vs. PMOS Perspective
In this paper we explore the use of a set of novel design metrics for characterizing the impact of gate oxide tunneling current in nanometer CMOS devices and perform Monte Carlo s...
Elias Kougianos, Saraju P. Mohanty
ICASSP
2008
IEEE
14 years 1 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig