Sciweavers

1085 search results - page 132 / 217
» A Timing Attack on RC5
Sort
View
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 4 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
IPPS
2007
IEEE
15 years 4 months ago
A Cryptographic Coarse Grain Reconfigurable Architecture Robust Against DPA
This work addresses the problem of information leakage of cryptographic devices, by using the reconfiguration technique allied to an RNS based arithmetic. The information leaked b...
Daniel Mesquita, Benoît Badrignans, Lionel T...
ISCAS
2006
IEEE
92views Hardware» more  ISCAS 2006»
15 years 3 months ago
Model of a true random number generator aimed at cryptographic applications
— The paper presents a simple stochastic model of a True Random Number Generator, which extracts randomness from the tracking jitter of a phase-locked loop. The existence of such...
Martin Simka, Milos Drutarovský, Viktor Fis...
ICMCS
2005
IEEE
140views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Watermarking digital 3D volumes in the discrete Fourier transform domain
In this paper, a robust blind watermarking method for 3D volumes is presented. A bivalued watermark is embedded in the Fourier transform magnitude of the 3D volume. The Fourier do...
Vassilios Solachidis, Ioannis Pitas
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
15 years 3 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne