Sciweavers

923 search results - page 75 / 185
» Improved Slide Attacks
Sort
View
BMCBI
2008
112views more  BMCBI 2008»
14 years 12 months ago
Normalization for triple-target microarray experiments
Background: Most microarray studies are made using labelling with one or two dyes which allows the hybridization of one or two samples on the same slide. In such experiments, the ...
Marie-Laure Martin-Magniette, Julie Aubert, Avner ...
SEC
2008
15 years 1 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
PKC
2011
Springer
197views Cryptology» more  PKC 2011»
14 years 2 months ago
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
We investigate the security of a generalization of HFE (multivariate and odd-characteristic variants). First, we propose an improved version of the basic Kipnis-Shamir key recovery...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
IACR
2011
182views more  IACR 2011»
13 years 11 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
ECCV
2008
Springer
16 years 1 months ago
Learning Spatial Context: Using Stuff to Find Things
The sliding window approach of detecting rigid objects (such as cars) is predicated on the belief that the object can be identified from the appearance in a small region around the...
Geremy Heitz, Daphne Koller