Sciweavers

1188 search results - page 191 / 238
» States of Knowledge
Sort
View
ICISC
2009
125views Cryptology» more  ICISC 2009»
14 years 8 months ago
Power Analysis of Single-Rail Storage Elements as Used in MDPL
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic...
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Ch...
JDIM
2010
156views more  JDIM 2010»
14 years 5 months ago
Rule based Autonomous Citation Mining with TIERL
: Citations management is an important task in managing digital libraries. Citations provide valuable information e.g., used in evaluating an author's influences or scholarly ...
Muhammad Tanvir Afzal, Hermann A. Maurer, Wolf-Til...
JOC
2010
92views more  JOC 2010»
14 years 5 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
SBMF
2010
Springer
205views Formal Methods» more  SBMF 2010»
14 years 5 months ago
A High-Level Language for Modeling Algorithms and Their Properties
Designers of concurrent and distributed algorithms usually express them using pseudo-code. In contrast, most verification techniques are based on more mathematically-oriented forma...
Sabina Akhtar, Stephan Merz, Martin Quinson
TSP
2010
14 years 5 months ago
Linear precoder design through cut-off rate maximization in MIMO-OFDM coded systems with imperfect CSIT
This paper proposes a linear transmitter design that aims at minimizing the packet error rate (PER) using partial channel state information at the transmitter (CSIT). The design is...
Francesc Rey, Meritxell Lamarca, Gregori Vá...