Sciweavers

373 search results - page 7 / 75
» Two Attacks on Reduced IDEA
Sort
View
ICCSA
2004
Springer
14 years 1 months ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
AINA
2003
IEEE
13 years 11 months ago
Signature Schemes Based on Two Hard Problems Simultaneously
In 1994, Harn proposed a signature scheme based on the modified ElGamal's scheme and claimed that the security relies on both of the factorization and the discrete logarithm....
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
DFT
2003
IEEE
79views VLSI» more  DFT 2003»
14 years 27 days ago
Partial Error Masking to Reduce Soft Error Failure Rate in Logic Circuits
A new methodology for designing logic circuits with partial error masking is described. The key idea is to exploit the asymmetric soft error susceptibility of nodes in a logic cir...
Kartik Mohanram, Nur A. Touba
GFKL
2005
Springer
105views Data Mining» more  GFKL 2005»
14 years 1 months ago
Variable Selection for Discrimination of More Than Two Classes Where Data are Sparse
In classification, with an increasing number of variables, the required number of observations grows drastically. In this paper we present an approach to put into effect the maxi...
Gero Szepannek, Claus Weihs
CHES
2000
Springer
121views Cryptology» more  CHES 2000»
13 years 11 months ago
On Boolean and Arithmetic Masking against Differential Power Analysis
Abstract. Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in order to protect software implementations...
Jean-Sébastien Coron, Louis Goubin