Sciweavers

86 search results - page 1 / 18
» Analysis and Optimization of Cryptographically Generated Add...
Sort
View
ISW
2009
Springer
13 years 11 months ago
Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
13 years 10 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
NDSS
2003
IEEE
13 years 10 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
DAC
1997
ACM
13 years 9 months ago
Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures
—Many application-specific architectures provide indirect addressing modes with auto-increment/decrement arithmetic. Since these architectures generally do not feature an indexe...
Ashok Sudarsanam, Stan Y. Liao, Srinivas Devadas
ICASSP
2008
IEEE
13 years 11 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia