Sciweavers

210 search results - page 39 / 42
» Wiretap Channel With Side Information
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
15 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 6 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
90
Voted
CORR
2008
Springer
147views Education» more  CORR 2008»
14 years 10 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
GLOBECOM
2008
IEEE
15 years 4 months ago
Low-Complexity Hybrid QRD-MCMC MIMO Detection
In this paper, we propose a novel hybrid QRD-MCMC MIMO detector that combines the feature of a QRD-M detector and a Markov chain Monte Carlo (MCMC) detector. The QRD-M algorithm i...
Ronghui Peng, Koon Hoo Teo, Jinyun Zhang, Rong-Ron...