Sciweavers

1369 search results - page 62 / 274
» A Practical Implementation of the Timing Attack
Sort
View
VTC
2006
IEEE
118views Communications» more  VTC 2006»
15 years 5 months ago
Demodulation and Performance Analysis of Differential Unitary Space-Time Modulation in Time-Varying Rician Channels
Abstract— Studies on differential unitary space-time modulation are mostly focused on Rayleigh fading channels. In this paper we present new analytic results for the maximum-like...
Haichang Sui, James R. Zeidler
DAC
2005
ACM
15 years 12 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
CHI
2008
ACM
15 years 11 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
WEA
2005
Springer
98views Algorithms» more  WEA 2005»
15 years 4 months ago
Implementing Minimum Cycle Basis Algorithms
Abstract. In this paper we consider the problem of computing a minimum cycle basis of an undirected graph G = (V, E) with n vertices and m edges. We describe an efficient implement...
Kurt Mehlhorn, Dimitrios Michail
VOTEID
2007
Springer
15 years 5 months ago
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulat...
Jens-Matthias Bohli, Jörn Müller-Quade, ...