Sciweavers

634 search results - page 40 / 127
» Groundwork for Weak Analysis
Sort
View
ASYNC
2005
IEEE
174views Hardware» more  ASYNC 2005»
15 years 7 months ago
Delay Insensitive Encoding and Power Analysis: A Balancing Act
Unprotected cryptographic hardware is vulnerable to a side-channel attack known as Differential Power Analysis (DPA). This attack exploits data-dependent power consumption of a co...
Konrad J. Kulikowski, Ming Su, Alexander B. Smirno...
94
Voted
IWINAC
2005
Springer
15 years 7 months ago
Separation of Extracellular Spikes: When Wavelet Based Methods Outperform the Principle Component Analysis
spike separation is a basic prerequisite for analyzing of the cooperative neural behavior and neural code when registering extracelluIarly. Final performance of any spike sorting m...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 5 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
CSREASAM
2004
15 years 3 months ago
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure
The modern electric power grid is a complex interconnected network of independent physical and electronic devices that utilize myriad technologies for communication between other ...
Patrick R. Merry, Axel W. Krings, Paul W. Oman
ICEB
2004
158views Business» more  ICEB 2004»
15 years 3 months ago
E-Business Adoption in Marketing and Its Relationship with Factors in SWOT Analysis: an Empirical Investigation of Small Softwar
This research gives empirically grounded insights into e-business adoption in conjunction with factors usually considered in SWOT (Strengths, Weaknesses, Opportunities, and Threat...
Edward Bernroider, Alexander Hampel