Sciweavers

113 search results - page 3 / 23
» Computing the Leakage of Information-Hiding Systems
Sort
View
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 2 days ago
On the Performance of OFDM in Zero-IF Receivers Impaired by Tx Leakage
—Transmitter Leakage has a significant impact on the system performance in mobile devices using zero-IF receivers. In this contribution, the statistical properties of the Tx Lea...
Andreas Frotzscher, Marco Krondorf, Gerhard Fettwe...
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
11 years 7 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
DAC
2006
ACM
14 years 6 months ago
Leakage power reduction of embedded memories on FPGAs through location assignment
Transistor leakage is poised to become the dominant source of power dissipation in digital systems, and reconfigurable devices are not immune to this problem. Modern FPGAs already...
Yan Meng, Timothy Sherwood, Ryan Kastner
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...