Sciweavers

ITCC
2005
IEEE
14 years 2 months ago
A Stemming Algorithm for the Farsi Language
In this paper, we report on the design and implementation of a stemmer for the Farsi language. The results of our evaluation on a small Farsi document collection shows a signific...
Kazem Taghva, Russell Beckley, Mohammad Sadeh
ITCC
2005
IEEE
14 years 2 months ago
FPGA Implementations of the ICEBERG Block Cipher
— This paper presents FPGA (Field Programmable Gate Array) implementations of ICEBERG, a block cipher designed for reconfigurable hardware implementations and presented at FSE 2...
François-Xavier Standaert, Gilles Piret, Ga...
ITCC
2005
IEEE
14 years 2 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
ITCC
2005
IEEE
14 years 2 months ago
Practical Evaluation of a Radial Soft Hash Algorithm
François-Xavier Standaert, Fréd&eacu...
ITCC
2005
IEEE
14 years 2 months ago
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are ...
Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luc...
ITCC
2005
IEEE
14 years 2 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton
ITCC
2005
IEEE
14 years 2 months ago
Byteprints: A Tool to Gather Digital Evidence
In this paper, we present techniques to recover useful information from disk drives that are used to store user data. The main idea is to use a logging mechanism to record the mod...
Sriranjani Sitaraman, Srinivasan Krishnamurthy, Su...
ITCC
2005
IEEE
14 years 2 months ago
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function
Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong...
ITCC
2005
IEEE
14 years 2 months ago
Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties
Many edge detection schemes suffer from the lack of image quality at the global level. Global properties are more vital in grayscale images due to loss of hue and texture. This pa...
John See, Madasu Hanmandlu, Shantaram Vasikarla