Sciweavers

372 search results - page 21 / 75
» On the Security of a Unified Countermeasure
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Fault Attacks on Dual-Rail Encoded Systems
Fault induction attacks are a serious concern for designers of secure embedded systems. An ideal solution would be a generic circuit transformation that would produce circuits tha...
Jason Waddle, David Wagner
CSFW
2010
IEEE
15 years 1 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
IFIP
2009
Springer
15 years 4 months ago
Detecting Spam at the Network Level
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been estimated that 80% of all email messages are spam. Content-based filters are a ...
Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras
MOC
2010
14 years 4 months ago
Unified primal formulation-based a priori and a posteriori error analysis of mixed finite element methods
We derive in this paper a unified framework for a priori and a posteriori error analysis of mixed finite element discretizations of second-order elliptic problems. It is based on ...
Martin Vohralík
ICISC
2004
112views Cryptology» more  ICISC 2004»
14 years 11 months ago
Improvement on Ha-Moon Randomized Exponentiation Algorithm
Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. Howe...
Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, Jae...