Sciweavers

694 search results - page 83 / 139
» The Power of the Middle Bit
Sort
View
APCCAS
2006
IEEE
268views Hardware» more  APCCAS 2006»
14 years 2 months ago
A One-Dimensional Technique for Embedding Data in A JPEG Color Image
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Kaliappan Gopalan
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
14 years 2 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
IEEEARES
2006
IEEE
14 years 2 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
14 years 1 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CASES
2009
ACM
14 years 21 days ago
Side channel analysis of AVR XMEGA crypto engine
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel atta...
Ilya Kizhvatov