Sciweavers

11 search results - page 2 / 3
» BIRTHDAY 2012
Sort
View
BIRTHDAY
2012
Springer
12 years 29 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
BIRTHDAY
2012
Springer
12 years 29 days ago
Triangular and Hexagonal Tile Self-assembly Systems
Abstract. We discuss theoretical aspects of the self-assembly of triangular tiles, in particular, right triangular tiles and equilateral triangular tiles, and the self-assembly of ...
Lila Kari, Shinnosuke Seki, Zhi Xu
BIRTHDAY
2012
Springer
12 years 29 days ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...
BIRTHDAY
2012
Springer
12 years 29 days ago
Model Transformation By-Example: A Survey of the First Wave
Abstract. Model-Driven Engineering (MDE) places models as firstclass artifacts throughout the software lifecycle. In this context, model transformations are crucial for the succes...
Gerti Kappel, Philip Langer, Werner Retschitzegger...
BIRTHDAY
2012
Springer
12 years 29 days ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...