Sciweavers

384 search results - page 39 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
CVPR
2003
IEEE
16 years 4 months ago
3D Surface Modeling from Range Curves
Traditional approaches for surface reconstruction from range data require that the input data be either range images or unorganized sets of points. Since a large number of range s...
Dragan Tubic, Patrick Hébert, Denis Laurend...
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 8 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
NDSS
2009
IEEE
15 years 8 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 8 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
15 years 7 months ago
Messin' with Texas Deriving Mother's Maiden Names Using Public Records
We have developed techniques to automatically infer mother's maiden names from public records. We demonstrate our techniques using publicly available records from the state o...
Virgil Griffith, Markus Jakobsson