Sciweavers

2208 search results - page 213 / 442
» Memory Practices in the Sciences
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 2 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
ACMDIS
2008
ACM
15 years 26 days ago
Sharing digital photographs in the home through physical mementos, souvenirs, and keepsakes
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
Michael Nunes, Saul Greenberg, Carman Neustaedter
SPE
2002
141views more  SPE 2002»
14 years 10 months ago
Data collection and restoration for heterogeneous process migration
This study presents a practical solution for data collection and restoration to migrate a process written in high level stack-based languages such as C and Fortran over a network ...
Kasidit Chanchio, Xian-He Sun
PR
2008
202views more  PR 2008»
14 years 9 months ago
Building compact MQDF classifier for large character set recognition by subspace distribution sharing
Quadratic classifier with modified quadratic discriminant function (MQDF) has been successfully applied to recognition of handwritten characters to achieve very good performance. ...
Teng Long, Lianwen Jin
ASIACRYPT
2011
Springer
13 years 10 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...