Sciweavers

29 search results - page 6 / 6
» Evolution of Type-1 Clones
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 25 days ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CEC
2007
IEEE
14 years 18 days ago
Clonal particle swarm optimization and its applications
— Particle swarm optimization (PSO) is a stochastic global optimization algorithm inspired by social behavior of bird flocking in search for food, which is a simple but powerful...
Y. Tan, Z. M. Xiao
CCS
2010
ACM
13 years 6 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
BMCBI
2005
114views more  BMCBI 2005»
13 years 6 months ago
Extension of Lander-Waterman theory for sequencing filtered DNA libraries
Background: The degree to which conventional DNA sequencing techniques will be successful for highly repetitive genomes is unclear. Investigators are therefore considering various...
Michael C. Wendl, W. Bradley Barbazuk