Sciweavers

694 search results - page 66 / 139
» The Power of the Middle Bit
Sort
View
EUROCRYPT
2010
Springer
14 years 25 days ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
COCO
2010
Springer
153views Algorithms» more  COCO 2010»
13 years 12 months ago
Communication Complexity with Synchronized Clocks
Abstract—We consider two natural extensions of the communication complexity model that are inspired by distributed computing. In both models, two parties are equipped with synchr...
Russell Impagliazzo, Ryan Williams
TSP
2008
149views more  TSP 2008»
13 years 8 months ago
Decentralized Quantized Kalman Filtering With Scalable Communication Cost
Estimation and tracking of generally nonstationary Markov processes is of paramount importance for applications such as localization and navigation. In this context, ad hoc wireles...
Eric J. Msechu, Stergios I. Roumeliotis, Alejandro...
VTC
2007
IEEE
14 years 2 months ago
A Tail-Biting Turbo Coded OFDM System for PAPR and BER Reduction
— In a turbo coded orthogonal frequency-division multiplexing (TCOFDM) system, low peak-to-average power ratio (PAPR) can be achieved by selective-mapping (SLM). In this paper, w...
Yung-Chih Tsai, Yeong-Luh Ueng
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
14 years 2 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron