Sciweavers

1560 search results - page 28 / 312
» Broadcasting with Side Information
Sort
View
110
Voted
AES
2004
Springer
190views Cryptology» more  AES 2004»
15 years 2 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful field for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee
LATIN
2010
Springer
15 years 4 months ago
Optimal Polygonal Representation of Planar Graphs
In this paper, we consider the problem of representing graphs by polygons whose sides touch. We show that at least six sides per polygon are necessary by constructing a class of pl...
Emden R. Gansner, Yifan Hu, Michael Kaufmann, Step...
GROUP
2005
ACM
15 years 3 months ago
Broadcasting information via display names in instant messaging
Many instant messenger (IM) clients let a person specify the identifying name that appears in another person’s contact list. We have noticed that many people add extra informati...
Stephanie Smale, Saul Greenberg
82
Voted
ACL
2001
14 years 11 months ago
Processing Broadcast Audio for Information Access
This paper addresses recent progress in speaker-independent, large vocabulary, continuous speech recognition, which has opened up a wide range of near and mid-term applications. O...
Jean-Luc Gauvain, Lori Lamel, Gilles Adda, Martine...
70
Voted
IOLTS
2005
IEEE
120views Hardware» more  IOLTS 2005»
15 years 3 months ago
Side-Channel Issues for Designing Secure Hardware Implementations
Selecting a strong cryptographic algorithm makes no sense if the information leaks out of the device through sidechannels. Sensitive information, such as secret keys, can be obtai...
Lejla Batina, Nele Mentens, Ingrid Verbauwhede