Sciweavers

ITCC
2005
IEEE
13 years 10 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
ITCC
2005
IEEE
13 years 10 months ago
Practical Evaluation of a Radial Soft Hash Algorithm
François-Xavier Standaert, Fréd&eacu...
ITCC
2005
IEEE
13 years 10 months ago
A Parallelized Design for an Elliptic Curve Cryptosystem Coprocessor
In many applications a software implementation of ECC (Elliptic Curve Cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are ...
Fabio Sozzani, Guido Bertoni, Stefano Turcato, Luc...
ITCC
2005
IEEE
13 years 10 months ago
Frequency Hopping Pattern Detection in Wireless Ad Hoc Networks
Frequency hopping is a technique that wireless devices communicate in a way that the transmission frequencies are alternated in a pre-determined ordered hopping pattern known only...
Min Song, Scott Wigginton
ITCC
2005
IEEE
13 years 10 months ago
Byteprints: A Tool to Gather Digital Evidence
In this paper, we present techniques to recover useful information from disk drives that are used to store user data. The main idea is to use a logging mechanism to record the mod...
Sriranjani Sitaraman, Srinivasan Krishnamurthy, Su...
ITCC
2005
IEEE
13 years 10 months ago
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function
Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong...
ITCC
2005
IEEE
13 years 10 months ago
Fuzzy-based Parameterized Gaussian Edge Detector Using Global and Local Properties
Many edge detection schemes suffer from the lack of image quality at the global level. Global properties are more vital in grayscale images due to loss of hue and texture. This pa...
John See, Madasu Hanmandlu, Shantaram Vasikarla
ITCC
2005
IEEE
13 years 10 months ago
A Proposal of Short Proxy Signature using Pairing
— In this paper, we propose a new pairing-based proxy signature. Most remarkable point in our proposal is that our scheme realizes short signature. More concretely, the explicit ...
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
ITCC
2005
IEEE
13 years 10 months ago
An Analysis of Reliable Delivery Specifications for Web Services
Reliable delivery of messages is now a key component of the Web Services roadmap, with two promising, and competing, specifications in this area viz. WS-Reliability (WSR) from OAS...
Shrideep Pallickara, Geoffrey Fox, Sangmi Lee Pall...