Sciweavers

704 search results - page 101 / 141
» A Practical Attack on KeeLoq
Sort
View
ISCAS
2008
IEEE
102views Hardware» more  ISCAS 2008»
15 years 6 months ago
Asynchronous balanced gates tolerant to interconnect variability
Abstract— Existing methods of gate level power attack countermeasures depend on exact capacitance matching of the dual-rail data outputs of each gate. Process variability and a l...
Konrad J. Kulikowski, Vyas Venkataraman, Zhen Wang...
CEC
2007
IEEE
15 years 6 months ago
Heuristic search for non-linear cryptanalytic approximations
— In this work, we show that heuristic techniques (particularly Simulated Annealing) can be successfully applied in the search of good non-linear approximations of cryptographic ...
Juan M. Estévez-Tapiador, Julio Césa...
DATE
2006
IEEE
104views Hardware» more  DATE 2006»
15 years 5 months ago
Optimizing sequential cycles through Shannon decomposition and retiming
—Optimizing sequential cycles is essential for many types of high-performance circuits, such as pipelines for packet processing. Retiming is a powerful technique for speeding pip...
Cristian Soviani, Olivier Tardieu, Stephen A. Edwa...
IEEEARES
2006
IEEE
15 years 5 months ago
Towards an Integrated Conceptual Model of Security and Dependability
It is now commonly accepted that security and dependability largely represent two different aspects of an overall meta-concept that reflects the trust that we put in a computer s...
Erland Jonsson
ADHOCNOW
2006
Springer
15 years 5 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou