The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
Double-sided manuscripts are often degraded by bleedthrough interference. Such degradation must be corrected to facilitate human perception and machine recognition. Most approache...
Both graphic text and scene text detection in video images with complex background and low resolution is still a challenging and interesting problem for researchers in the field o...
Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...