Results 1 - 10
of
64
Unifying leakage models: from probing attacks to noisy leakage. Cryptology ePrint Archive, Report 2014/079
, 2014
"... Abstract. A recent trend in cryptography is to formally show the leakage resilience of crypto-graphic implementations in a given leakage model. One of the most prominent leakage models – the so-called bounded leakage model – assumes that the amount of leakage is a-priori bounded. Unfortunately, it h ..."
Abstract
-
Cited by 14 (3 self)
- Add to MetaCart
Abstract. A recent trend in cryptography is to formally show the leakage resilience of crypto-graphic implementations in a given leakage model. One of the most prominent leakage models – the so-called bounded leakage model – assumes that the amount of leakage is a-priori bounded. Unfortunately
Active Mask Framework for Segmentation of Fluorescence Microscope Images
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract
- Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly
APractical Lattice-based Digital Signature Schemes
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract
- Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case
Minimum Variance Estimation of a Sparse Vector Within the Linear Gaussian Model: An
"... Abstract — We consider minimum variance estimation within the sparse linear Gaussian model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Our analysis is based on the theory of reproducing kernel Hilbert spaces (RKHS). After a characterizat ..."
Abstract
- Add to MetaCart
Abstract — We consider minimum variance estimation within the sparse linear Gaussian model (SLGM). A sparse vector is to be estimated from a linearly transformed version embedded in Gaussian noise. Our analysis is based on the theory of reproducing kernel Hilbert spaces (RKHS). After a
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
"... Abstract. Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type of adversa ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract. Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box secure block cipher based symmetric encryption schemes, which we prove secure in the physically observable cryptography model. They are proven side-channel secure against a strong type
22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract
- Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system
Memory Allocation Algorithms
, 1972
"... identify all the kinds of storage which the supervisor implements. This class of channels will not be considered further. The following simple principle is sufficient to block all legitimate and covert channels. Masking: A program to be confined must allow its caller to determine all its inputs into ..."
Abstract
- Add to MetaCart
into legitimate and covert channels. We say that the channels are masked by the caller. At first sight it seems absurd to allow the customer to determine the bill, but since the service has the right to reject the call, this scheme is an exact model of the purchase order system used for industrial procurement
A stochastic modeling methodology based on weighted Wiener chaos and Malliavin calculus,
- Proc. Natl. Acad. Sci. USA
, 2009
"... In many stochastic partial differential equations (SPDEs) involving random coefficients, modeling the randomness by spatial white noise may lead to ill-posed problems. Here we consider an elliptic problem with spatial Gaussian coefficients and present a methodology that resolves this issue. It is b ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
developed an efficient numerical method for solving second-order elliptic SPDEs with Gaussian coefficients. We introduced the concept of "stochastic convolution model" and employed Malliavin calculus to implement it. The stochastic solution was represented by a weighted WCE in the appropriate norm
Chapter 1 Stabilization and Control over Gaussian Networks
"... Abstract We provide an overview and some recent results on real-time communication and control over Gaussian channels. In particular, the problem of remote stabilization of linear systems driven by Gaussian noise over Gaussian relay channels is considered. Necessary and sufficient conditions for mea ..."
Abstract
- Add to MetaCart
consider the design of low-delay sensing and transmit schemes for real-time communication. 1.1
Results 1 - 10
of
64