Sciweavers

667 search results - page 15 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
CHES
2006
Springer
124views Cryptology» more  CHES 2006»
15 years 1 months ago
A Proposition for Correlation Power Analysis Enhancement
Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (...
Thanh-Ha Le, Jessy Clédière, C&eacut...
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
14 years 11 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
ENGL
2008
68views more  ENGL 2008»
14 years 9 months ago
Performance Analysis of Unipolar Code in Different Phase Modulations of Coherent Optical CDMA
This paper examines the bit-error rate (BER) for an optical direct-detection code-division multiple-access (OCDMA) system employing a novel prime code family, hereby referred to as...
Mohammad Massoud Karbassian, H. Ghafouri-Shira
PAA
2008
14 years 9 months ago
Distance-based discriminant analysis method and its applications
This paper proposes a method of finding a discriminative linear transformation that enhances the data's degree of conformance to the compactness hypothesis and its inverse. Th...
Serhiy Kosinov, Thierry Pun
SASN
2004
ACM
15 years 3 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...