Sciweavers

14518 search results - page 134 / 2904
» Two Problems for Sophistication
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 3 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
IPPS
2002
IEEE
14 years 3 months ago
Communication Characteristics of Large-Scale Scientific Applications for Contemporary Cluster Architectures
This paper examines the explicit communication characteristics of several sophisticated scientific applications, which, by themselves, constitute a representative suite of publicl...
Jeffrey S. Vetter, Frank Mueller
INFOCOM
2000
IEEE
14 years 1 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 10 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...
ENVSOFT
2007
126views more  ENVSOFT 2007»
13 years 10 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium â€...
Jeroen P. van der Sluijs