Sciweavers

20 search results - page 1 / 4
» Power and electromagnetic analysis: Improved model, conseque...
Sort
View
INTEGRATION
2007
107views more  INTEGRATION 2007»
13 years 4 months ago
Power and electromagnetic analysis: Improved model, consequences and comparisons
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA, EMA) have been successfully used to retrieve secret information stored in cryp...
Eric Peeters, François-Xavier Standaert, Je...
CODES
2001
IEEE
13 years 8 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont
BMCBI
2010
95views more  BMCBI 2010»
13 years 5 months ago
Modelling p-value distributions to improve theme-driven survival analysis of cancer transcriptome datasets
Background: Theme-driven cancer survival studies address whether the expression signature of genes related to a biological process can predict patient survival time. Although this...
Esteban Czwan, Benedikt Brors, David Kipling
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
13 years 9 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
CODES
2004
IEEE
13 years 8 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys