Sciweavers

3571 search results - page 67 / 715
» On the Power of Imperfect Information
Sort
View
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 3 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 3 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 9 months ago
Synthesis of Low-Power Digital Circuits Derived from Binary Decision Diagrams
-- This paper introduces a novel method for synthesizing digital circuits derived from Binary Decision Diagrams (BDDs) that can yield to reduction in power dissipation. The power r...
Denis V. Popel
ICCAD
2002
IEEE
113views Hardware» more  ICCAD 2002»
15 years 6 months ago
Interconnect-aware high-level synthesis for low power
Abstract—Interconnects (wires, buffers, clock distribution networks, multiplexers and busses) consume a signiï¬cant fraction of total circuit power. In this work, we demonstrat...
Lin Zhong, Niraj K. Jha
AES
2004
Springer
190views Cryptology» more  AES 2004»
15 years 3 months ago
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results
Abstract. When cryptosystems are being used in real life, hardware and software implementations themselves present a fruitful ï¬eld for attacks. Side channel attacks exploit infor...
Elena Trichina, Tymur Korkishko, Kyung-Hee Lee