Sciweavers

1898 search results - page 77 / 380
» Weak Keys for IDEA
Sort
View
IH
2007
Springer
14 years 2 months ago
A Fusion of Maximum Likelihood and Structural Steganalysis
Abstract. This paper draws together two methodologies for the detection of bit replacement steganography: the principle of maximum likelihood, which is statistically well-founded b...
Andrew D. Ker
MTSR
2007
Springer
14 years 2 months ago
Ontology for Preservation of Interactive Multimedia Performances
Preservation of interactive multimedia performances is becoming important as they are getting more and more popular in performing arts communities. A proper preservation does not o...
Kia Ng, Tran Vu Pham, Bee Ong, Alexander Mikroyann...
ITNG
2006
IEEE
14 years 2 months ago
On the Security of a Repaired Mental Poker Protocol
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be flawed in 2004: any player (or any outsider knowing the deck coding) is able to...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
ARITH
2005
IEEE
14 years 2 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
14 years 2 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede