Sciweavers

2108 search results - page 267 / 422
» Encrypted
Sort
View
DATE
2005
IEEE
116views Hardware» more  DATE 2005»
15 years 10 months ago
Uniformly-Switching Logic for Cryptographic Hardware
Recent work on Differential Power Analysis shows that even mathematically-secure cryptographic protocols may be vulnerable at the physical implementation level. By measuring energ...
Igor L. Markov, Dmitri Maslov
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
15 years 10 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 10 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
ICDM
2005
IEEE
153views Data Mining» more  ICDM 2005»
15 years 10 months ago
Privacy-Preserving Frequent Pattern Mining across Private Databases
Privacy consideration has much significance in the application of data mining. It is very important that the privacy of individual parties will not be exposed when data mining te...
Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang
ICMCS
2005
IEEE
126views Multimedia» more  ICMCS 2005»
15 years 10 months ago
IP Multicast Video Broadcasting System with User Authentication
This report describes a pay broadcasting system for the Internet. This system would enable tens of thousands of people to access an identical video stream simultaneously. In this ...
Hiroki Onishi, Takashi Satoh, Tetsutaro Uehara, Ka...