Sciweavers

210 search results - page 10 / 42
» Wiretap Channel With Side Information
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
Christine Guillemot, Gaëtan Le Guelvouit, St&...
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 4 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
IWDW
2005
Springer
15 years 3 months ago
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
Mark T. Hogan, Félix Balado, Neil J. Hurley...
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 2 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang