Sciweavers

52 search results - page 2 / 11
» On the Analysis of Cryptographic Assumptions in the Generic ...
Sort
View
WISA
2009
Springer
13 years 12 months ago
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
In CHES 2008 a generic side-channel distinguisher, Mutual Information, has been introduced to be independent of the relation between measurements and leakages as well as between le...
Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud ...
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
14 years 5 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
13 years 11 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
VTC
2006
IEEE
13 years 11 months ago
Performance Analysis for a Two-Ring Distributed MIMO-OFDM System
Distributed MIMO technology is an effective way of dealing with the inter-cell interference problem in single frequency wireless communication networks. This paper studies the gene...
Xiaolin Zhou, Himal A. Suraweera, Jean Armstrong
IPL
2011
91views more  IPL 2011»
12 years 8 months ago
Fast leader election in anonymous rings with bounded expected delay
We propose a probabilistic network model, called asynchronous bounded expected delay (ABE), which requires a known bound on the expected message delay. In ABE networks all asynchr...
Rena Bakhshi, Jörg Endrullis, Wan Fokkink, Ju...