Sciweavers

1369 search results - page 63 / 274
» A Practical Implementation of the Timing Attack
Sort
View
DISCEX
2003
IEEE
15 years 4 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
ASIACRYPT
2003
Springer
15 years 4 months ago
Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d
The Weil and Tate pairings have been used recently to build new schemes in cryptography. It is known that the Weil pairing takes longer than twice the running time of the Tate pair...
Iwan M. Duursma, Hyang-Sook Lee
DATE
2009
IEEE
156views Hardware» more  DATE 2009»
15 years 5 months ago
Implementation of a reduced-lattice MIMO detector for OFDM Systems
—This paper presents a novel VLSI implementation of a MIMO detector for OFDM systems. The proposed architecture is able to perform both linear MMSE and reduced latticeaided MIMO ...
Josep Soler Garrido, Henning Vetter, Magnus Sandel...
SUTC
2010
IEEE
14 years 9 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
15 years 5 months ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee