Sciweavers

518 search results - page 75 / 104
» Abstract Interpretation-Based Protection
Sort
View
ITCC
2005
IEEE
15 years 7 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
ADAEUROPE
2005
Springer
15 years 7 months ago
Integrating Application-Defined Scheduling with the New Dispatching Policies for Ada Tasks
: In previous papers we had presented an application program interface (API) that enabled applications to use application-defined scheduling algorithms for Ada tasks in a way compa...
Mario Aldea Rivas, Javier Miranda, Michael Gonz&aa...
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 7 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
FC
2005
Springer
133views Cryptology» more  FC 2005»
15 years 7 months ago
RFID Traceability: A Multilayer Problem
Abstract. RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious im...
Gildas Avoine, Philippe Oechslin
IPOM
2005
Springer
15 years 7 months ago
Policy-Based Fault Management for Integrating IP over Optical Networks
Abstract. In this paper we present a policy-based architecture for aggregating (grooming) IP/MPLS flows (packet-based LSPs) within lightpaths taking into account the possibility o...
Cláudio Carvalho, Edmundo Roberto Mauro Mad...