Sciweavers

129
Voted
ECAI
2004
Springer
15 years 7 months ago
Evaluation Strategies for Planning as Satisfiability
Abstract. We investigate different evaluation strategies for planning problems represented as constraint satisfaction or satisfiability problems. The standard evaluation strategy, ...
Jussi Rintanen
145
Voted
CHI
2006
ACM
15 years 7 months ago
Usability tool for analysis of web designs using mouse tracks
This paper presents MouseTrack as a web logging system that tracks mouse movements on websites. The system includes a visualization tool that displays the mouse cursor path follow...
Ernesto Arroyo, Ted Selker, Willy Wei
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
15 years 7 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
147
Voted
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
15 years 7 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...
129
Voted
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
15 years 7 months ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...