Sciweavers

694 search results - page 83 / 139
» The Power of the Middle Bit
Sort
View
APCCAS
2006
IEEE
268views Hardware» more  APCCAS 2006»
15 years 6 months ago
A One-Dimensional Technique for Embedding Data in A JPEG Color Image
—A method of embedding data in a JPEG color image for applications such as authentication of an employee carrying a picture identification card is described. Embedding of data, s...
Kaliappan Gopalan
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 6 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
87
Voted
IEEEARES
2006
IEEE
15 years 5 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 5 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
CASES
2009
ACM
15 years 4 months ago
Side channel analysis of AVR XMEGA crypto engine
AVR XMEGA is the recent general-purpose 8-bit microcontroller from Atmel featuring symmetric crypto engines. We analyze the resistance of XMEGA crypto engines to side channel atta...
Ilya Kizhvatov