Sciweavers

CHES
2006
Springer
84views Cryptology» more  CHES 2006»
15 years 7 months ago
Integer Factoring Utilizing PC Cluster
Kazumaro Aoki
111
Voted
ECAI
2004
Springer
15 years 7 months ago
Representing Knowledge about Norms
Norms are essential to extend inference: inferences based on norms are far richer than those based on logical implications. In the recent decades, much effort has been devoted to r...
Daniel Kayser, Farid Nouioua
107
Voted
CHES
2006
Springer
156views Cryptology» more  CHES 2006»
15 years 7 months ago
HIGHT: A New Block Cipher Suitable for Low-Resource Device
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous ...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Li...
CHES
2006
Springer
152views Cryptology» more  CHES 2006»
15 years 7 months ago
Security Evaluation of DPA Countermeasures Using Dual-Rail Pre-charge Logic Style
In recent years, some countermeasures against Differential Power Analysis (DPA) at the logic level have been proposed. At CHES 2005 conference, Popp and Mangard proposed a new coun...
Daisuke Suzuki, Minoru Saeki
125
Voted
ECAI
2004
Springer
15 years 7 months ago
Yet More Efficient EM Learning for Parameterized Logic Programs by Inter-Goal Sharing
Abstract. In previous research, we presented a dynamicprogramming-based EM (expectation-maximization) algorithm for parameterized logic programs, which is based on the structure sh...
Yoshitaka Kameya, Taisuke Sato, Neng-Fa Zhou