Sciweavers

257 search results - page 45 / 52
» Breaking Value Symmetry
Sort
View
JCS
2008
93views more  JCS 2008»
14 years 11 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JSS
2006
66views more  JSS 2006»
14 years 11 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
MR
2002
62views Robotics» more  MR 2002»
14 years 11 months ago
Impact of circuit resistance on the breakdown voltage of tantalum chip capacitors
Experiments are described in this paper whose results suggest a clear mathematical relationship between total circuit resistance (including the capacitor's ESR) and the volta...
Erik K. Reed, Jonathan L. Paulsen
INDOCRYPT
2010
Springer
14 years 9 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
ISCA
2007
IEEE
90views Hardware» more  ISCA 2007»
15 years 6 months ago
Transparent control independence (TCI)
AL-ZAWAWI, AHMED SAMI. Transparent Control Independence (TCI). (Under the direction of Dr. Eric Rotenberg). Superscalar architectures have been proposed that exploit control indep...
Ahmed S. Al-Zawawi, Vimal K. Reddy, Eric Rotenberg...