Sciweavers

41472 search results - page 8018 / 8295
» or 2006
Sort
View
105
Voted
CGO
2006
IEEE
15 years 4 months ago
Profiling over Adaptive Ranges
Modern computer systems are called on to deal with billions of events every second, whether they are instructions executed, memory locations accessed, or packets forwarded. This p...
Shashidhar Mysore, Banit Agrawal, Timothy Sherwood...
95
Voted
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
15 years 4 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
105
Voted
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
15 years 4 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
114
Voted
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 4 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
CIA
2006
Springer
15 years 4 months ago
The Helpful Environment: Distributed Agents and Services Which Cooperate
Imagine a future environment where networks of agents - people, robots and software agents - interact with sophisticated sensor grids and environmental actuators to provide advice,...
Austin Tate
« Prev « First page 8018 / 8295 Last » Next »