Sciweavers

12 search results - page 3 / 3
» icisc 2009
Sort
View
ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 2 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 2 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...