Sciweavers

53 search results - page 1 / 11
» Further Observations on the Structure of the AES Algorithm
Sort
View
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
13 years 9 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry
AE
2005
Springer
13 years 10 months ago
An Enhanced Genetic Algorithm for Protein Structure Prediction Using the 2D Hydrophobic-Polar Model
This paper presents an enhanced genetic algorithm for the protein structure prediction problem. A new fitness function, that uses the concept of radius of gyration, is proposed. Al...
Heitor S. Lopes, Marcos P. Scapin
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 5 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 8 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CVPR
2000
IEEE
13 years 9 months ago
A Linear Algorithm for Camera Self-Calibration, Motion and Structure Recovery for Multi-Planar Scenes from Two Perspective Image
In this paper we show that given two homography matrices for two planes in space, there is a linear algorithm for the rotation and translation between the two cameras, the focal l...
Gang Xu, Jun-ichi Terai, Heung-Yeung Shum