Sciweavers

180 search results - page 35 / 36
» An Information-Theoretic Model for Steganography
Sort
View
ASIACRYPT
2010
Springer
13 years 3 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 22 days ago
On Communication over Unknown Sparse Frequency-Selective Block-Fading Channels
The problem of reliable communication over unknown frequency-selective block-fading channels with sparse impulse responses is considered. In particular, discrete-time impulse respo...
Arun Pachai Kannu, Philip Schniter
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 6 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
14 years 6 months ago
Enhanced word clustering for hierarchical text classification
In this paper we propose a new information-theoretic divisive algorithm for word clustering applied to text classification. In previous work, such "distributional clustering&...
Inderjit S. Dhillon, Subramanyam Mallela, Rahul Ku...
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
14 years 16 days ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue