Sciweavers

12 search results - page 1 / 3
» Practical Attacks on Proximity Identification Systems (Short...
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
13 years 10 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
IOT
2010
13 years 2 months ago
Using web service gateways and code generation for sustainable IoT system development
Wireless Sensing and Radio Identification systems have undergone many innovations during the past years. This has led to short product lifetimes for both software and hardware comp...
Till Riedel, Nicolaie Fantana, Adrian Genaid, Dimi...
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
13 years 11 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
CVPR
2005
IEEE
14 years 6 months ago
Computer Vision for Music Identification
We describe how certain tasks in the audio domain can be effectively addressed using computer vision approaches. This paper focuses on the problem of music identification, where t...
Yan Ke, Derek Hoiem, Rahul Sukthankar