Sciweavers

180 search results - page 35 / 36
» An Information-Theoretic Model for Steganography
Sort
View
ASIACRYPT
2010
Springer
14 years 7 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
CORR
2010
Springer
139views Education» more  CORR 2010»
14 years 4 months ago
On Communication over Unknown Sparse Frequency-Selective Block-Fading Channels
The problem of reliable communication over unknown frequency-selective block-fading channels with sparse impulse responses is considered. In particular, discrete-time impulse respo...
Arun Pachai Kannu, Philip Schniter
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
15 years 10 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
KDD
2002
ACM
170views Data Mining» more  KDD 2002»
15 years 10 months ago
Enhanced word clustering for hierarchical text classification
In this paper we propose a new information-theoretic divisive algorithm for word clustering applied to text classification. In previous work, such "distributional clustering&...
Inderjit S. Dhillon, Subramanyam Mallela, Rahul Ku...
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue