Sciweavers

1560 search results - page 33 / 312
» Broadcasting with Side Information
Sort
View
116
Voted
ITNG
2006
IEEE
15 years 6 months ago
Side-Channel Leakage Tolerant Architectures
Side-channel attacks compare side-channel leakage predictions or estimations with side-channel leakage measurements. The estimations are based on the exact value of a few select s...
Kris Tiri, Patrick Schaumont, Ingrid Verbauwhede
112
Voted
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 7 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
95
Voted
IV
2006
IEEE
82views Visualization» more  IV 2006»
15 years 6 months ago
Two sides of the story: Visualising Products and Processes in Engineering Design
This paper describes research on the use of multiple views for modelling products and processes in the design of complex products. Single visual representations of design models o...
René Keller, Tomás L. Flanagan, Clau...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 10 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
131
Voted
CISS
2008
IEEE
15 years 2 months ago
A new approach to counting broadcast trees
Fulu Li, Kui Wu