Sciweavers

1898 search results - page 77 / 380
» Weak Keys for IDEA
Sort
View
131
Voted
IH
2007
Springer
15 years 9 months ago
A Fusion of Maximum Likelihood and Structural Steganalysis
Abstract. This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded b...
Andrew D. Ker
130
Voted
MTSR
2007
Springer
15 years 9 months ago
Ontology for Preservation of Interactive Multimedia Performances
Preservation of interactive multimedia performances is becoming important as they are getting more and more popular in performing arts communities. A proper preservation does not o...
Kia Ng, Tran Vu Pham, Bee Ong, Alexander Mikroyann...
112
Voted
ITNG
2006
IEEE
15 years 9 months ago
On the Security of a Repaired Mental Poker Protocol
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be flawed in 2004: any player (or any outsider knowing the deck coding) is able to...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
114
Voted
ARITH
2005
IEEE
15 years 9 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde
114
Voted
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 9 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede