Sciweavers

1560 search results - page 41 / 312
» Broadcasting with Side Information
Sort
View
109
Voted
CHES
2006
Springer
88views Cryptology» more  CHES 2006»
15 years 4 months ago
Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage
Recent research has shown that cryptographers with glitches are vulnerable in front of Side Channel Attacks (SCA). Since then, several methods, such as Wave Dynamic Differential Lo...
Zhimin Chen, Yujie Zhou
CHES
2006
Springer
117views Cryptology» more  CHES 2006»
15 years 4 months ago
High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching
This paper describes high-resolution waveform matching based on a Phase-Only Correlation (POC) technique and its application for a side-channel attack. Such attacks, such as Simple...
Naofumi Homma, Sei Nagashima, Yuichi Imai, Takafum...
109
Voted
CHI
2011
ACM
14 years 4 months ago
Side effects and "gateway" tools: advocating a broader look at evaluating persuasive systems
This paper argues for evaluating the impact of persuasive systems on users beyond metrics that focus on system usage, based on an interview study of 16 Wii Fit users. While explor...
Victoria Schwanda, Steven Ibara, Lindsay Reynolds,...
NIPS
2004
15 years 2 months ago
Distributed Information Regularization on Graphs
We provide a principle for semi-supervised learning based on optimizing the rate of communicating labels for unlabeled points with side information. The side information is expres...
Adrian Corduneanu, Tommi Jaakkola
EUROCRYPT
2009
Springer
16 years 1 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...