Sciweavers

1085 search results - page 161 / 217
» A Timing Attack on RC5
Sort
View
CHES
2006
Springer
246views Cryptology» more  CHES 2006»
15 years 1 months ago
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations
This article starts with a discussion of three different attacks on masked AES hardware implementations. This discussion leads to the conclusion that glitches in masked circuits po...
Stefan Mangard, Kai Schramm
ASIACRYPT
2001
Springer
15 years 1 months ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
ATAL
2008
Springer
14 years 11 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
AUSAI
2008
Springer
14 years 11 months ago
Discriminating Against New Classes: One-class versus Multi-class Classification
Many applications require the ability to identify data that is anomalous with respect to a target group of observations, in the sense of belonging to a new, previously unseen `atta...
Kathryn Hempstalk, Eibe Frank
SIROCCO
2010
14 years 11 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...