Sciweavers

384 search results - page 34 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
EUROCRYPT
2009
Springer
16 years 2 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
16 years 2 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
16 years 2 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
ICCD
2007
IEEE
206views Hardware» more  ICCD 2007»
15 years 11 months ago
SCAFFI: An intrachip FPGA asynchronous interface based on hard macros
Building fully synchronous VLSI circuits is becoming less viable as circuit geometries evolve. However, before the adoption of purely asynchronous strategies in VLSI design, globa...
Julian J. H. Pontes, Rafael Soares, Ewerson Carval...
ICIRA
2009
Springer
98views Robotics» more  ICIRA 2009»
14 years 11 months ago
Robot Formations for Area Coverage
Abstract. Two algorithms for area coverage (for use in space applications) were evaluated using a simulator and then tested on a multi-robot society consisting of LEGO Mindstorms r...
Jürgen Leitner