Sciweavers

3473 search results - page 25 / 695
» Differential Cluster Analysis
Sort
View
ISSTA
2012
ACM
13 years 4 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 5 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
106
Voted
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
DAC
2001
ACM
16 years 2 months ago
Modeling and Analysis of Differential Signaling for Minimizing Inductive Cross-Talk
Yehia Massoud, Jamil Kawa, Don MacMillen, Jacob Wh...
MICCAI
2006
Springer
16 years 2 months ago
Carotid Artery and Jugular Vein Tracking and Differentiation Using Spatiotemporal Analysis
David Wang, Roberta L. Klatzky, Nikhil Amesur, Geo...