Sciweavers

872 search results - page 2 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
13 years 2 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
MASS
2010
161views Communications» more  MASS 2010»
13 years 16 days ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
ASIACRYPT
2010
Springer
13 years 3 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
ISQED
2008
IEEE
109views Hardware» more  ISQED 2008»
14 years 4 days ago
Minimizing Offset for Latching Voltage-Mode Sense Amplifiers for Sub-Threshold Operation
This paper examines latch style voltage mode sense amplifiers for operation in the sub-threshold region, where VDD<VT. We show that the offset gets worse relative to strong inv...
Joseph F. Ryan, Benton H. Calhoun
IAJIT
2011
13 years 22 days ago
Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors
: In this paper, an analytical and simulation solution for touch mode Micro-electromechanical systems pressure sensor operating in harsh environment is proposed. The principle of t...
Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd S...