Sciweavers

14824 search results - page 2666 / 2965
» Security - Introduction
Sort
View
CONEXT
2006
ACM
15 years 7 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
15 years 7 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj
FTDCS
2004
IEEE
15 years 7 months ago
Self-Aware Distributed Embedded Systems
Distributed embedded sensor networks are now being successfully deployed in environmental monitoring of natural phenomena as well as for applications in commerce and physical secu...
Richard Pon, Maxim A. Batalin, Mohammad H. Rahimi,...
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 7 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
CRYPTO
2006
Springer
107views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Cryptanalysis of 2R- Schemes
Abstract. In this paper, we study the security of 2Rschemes [17,18], which are the "minus variant" of two-round schemes. This variant consists in removing some of the n p...
Jean-Charles Faugère, Ludovic Perret
« Prev « First page 2666 / 2965 Last » Next »