Sciweavers

1369 search results - page 79 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 11 months ago
Design and Implementation Aspects of a novel Java P2P Simulator with GUI
Peer-to-peer networks consist of thousands or millions of nodes that might join and leave arbitrarily. The evaluation of new protocols in real environments is many times practical...
Vassilios Chrissikopoulos, George Papaloukopoulos,...
HCI
2011
14 years 2 months ago
Online BCI Implementation of High-Frequency Phase Modulated Visual Stimuli
Abstract. Brain computer interfaces (BCI) that use the steady-statevisual-evoked-potential (SSVEP) as neural source, offer two main advantages over other types of BCIs: shorter ca...
Danhua Zhu, Gary Garcia Molina, Vojkan Mihajlovic,...
CCS
2004
ACM
15 years 4 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 4 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
76
Voted
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 5 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...