Sciweavers

1085 search results - page 81 / 217
» A Timing Attack on RC5
Sort
View
WSC
2004
14 years 11 months ago
Simulation in Context: Using Data Farming for Decision Support
Data Farming leverages high performance computing to run simple models many times. This process allows for the exploration of massive parameter spaces relatively quickly. This pap...
Philip S. Barry, Matthew T. K. Koehler
JSW
2008
97views more  JSW 2008»
14 years 9 months ago
Segmenting Histogram-based Robust Audio Watermarking Approach
Based on the invariant features and data distribution in time domain before and after attacking on the audio, it is clearly that the standard variance shows good invariant statisti...
Xiaoming Zhang
JNW
2006
55views more  JNW 2006»
14 years 9 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
AMC
2005
154views more  AMC 2005»
14 years 9 months ago
An improvement of the Yang-Shieh password authentication schemes
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-ba...
Chou Chen Yang, Ren-Chiun Wang, Ting Yi Chang
IACR
2011
88views more  IACR 2011»
13 years 9 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...