A Comparative Study of Mutual Information Analysis under a Gaussian Assumption (English)
- New search for: Moradi, Amir
- New search for: Mousavi, Nima
- New search for: Paar, Christof
- New search for: Salmasizadeh, Mahmoud
- New search for: Moradi, Amir
- New search for: Mousavi, Nima
- New search for: Paar, Christof
- New search for: Salmasizadeh, Mahmoud
In:
Information Security Applications
5
;
193-205
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
-
Contributors:Moradi, Amir ( author ) / Mousavi, Nima ( author ) / Paar, Christof ( author ) / Salmasizadeh, Mahmoud ( author )
-
Published in:Information Security Applications , 5 ; 193-205Lecture Notes in Computer Science ; 5932, 5 ; 193-205
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Protecting IPTV Service Network against Malicious Rendezvous PointKwon, Hyeokchan / Moon, Yong-Hyuk / Nah, Jaehoon / Seo, Dongil et al. | 2009
- 10
-
Design and Implementation of SIP-aware Security Management SystemKo, KyoungHee / Kim, Hwan-Kuk / Kim, JeongWook / Lee, Chang-Yong / Cha, Soo-Gil / Jeong, Hyun Cheol et al. | 2009
- 20
-
Application Management Framework in User Centric Smart Card Ownership ModelAkram, Raja Naeem / Markantonakis, Konstantinos / Mayes, Keith et al. | 2009
- 36
-
When Compromised Readers Meet RFIDAvoine, Gildas / Lauradoux, Cédric / Martin, Tania et al. | 2009
- 51
-
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?Medwed, Marcel / Schmidt, Jörn-Marc et al. | 2009
- 66
-
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic ModulesSugawara, Takeshi / Hayashi, Yu-ichi / Homma, Naofumi / Mizuki, Takaaki / Aoki, Takafumi / Sone, Hideaki / Satoh, Akashi et al. | 2009
- 79
-
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost EquipmentKasper, Timo / Oswald, David / Paar, Christof et al. | 2009
- 94
-
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random OraclesThorncharoensri, Pairat / Susilo, Willy / Mu, Yi et al. | 2009
- 109
-
Construction of Odd-Variable Boolean Function with Maximum Algebraic ImmunityFu, Shaojing / Qu, Longjiang / Li, Chao et al. | 2009
- 118
-
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK PrivacyPeng, Kun / Bao, Feng et al. | 2009
- 133
-
ID-Based Adaptive Oblivious TransferZhang, Fangguo / Zhao, Xingwen / Chen, Xiaofeng et al. | 2009
- 148
-
Unknown Plaintext Template AttacksHanley, Neil / Tunstall, Michael / Marnane, William P. et al. | 2009
- 163
-
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID DevicesPlos, Thomas / Hutter, Michael / Feldhofer, Martin et al. | 2009
- 178
-
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box ImplementationPan, J. / Hartog, J. I. / Lu, Jiqiang et al. | 2009
- 193
-
A Comparative Study of Mutual Information Analysis under a Gaussian AssumptionMoradi, Amir / Mousavi, Nima / Paar, Christof / Salmasizadeh, Mahmoud et al. | 2009
- 206
-
Finding Collisions for a 45-Step Simplified HAS-VMouha, Nicky / Cannière, Christophe / Indesteege, Sebastiaan / Preneel, Bart et al. | 2009
- 226
-
Non-linear Error Detection for Finite State MachinesAkdemir, Kahraman D. / Hammouri, Ghaith / Sunar, Berk et al. | 2009
- 239
-
Quadratic Equations from a Kind of S-boxesXie, Jia / Cao, Weiwei / Wang, TianZe et al. | 2009
- 254
-
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation StructureCao, Weiwei / Hu, Lei et al. | 2009
- 268
-
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANETHussain, Rasheed / Kim, Sangjin / Oh, Heekuck et al. | 2009
- 281
-
A Selectable k-Times Relaxed Anonymous Authentication SchemeEmura, Keita / Miyaji, Atsuko / Omote, Kazumasa et al. | 2009
- 296
-
PUF-Based Authentication Protocols – RevisitedBusch, Heike / Katzenbeisser, Stefan / Baecher, Paul et al. | 2009
- 309
-
Mediated Ciphertext-Policy Attribute-Based Encryption and Its ApplicationIbraimi, Luan / Petkovic, Milan / Nikova, Svetla / Hartel, Pieter / Jonker, Willem et al. | 2009
- 324
-
Securing Remote Access Inside Wireless Mesh NetworksManulis, Mark et al. | 2009
- 339
-
Detecting Ringing-Based DoS Attacks on VoIP Proxy ServersYum, Dae Hyun / Kim, Sun Young / Moon, HoKun / Kim, Mi-Yeon / Roh, Jae-Hoon / Lee, Pil Joong et al. | 2009
- 354
-
USN Middleware Security ModelKim, Mijoo / Yoon, Mi Yeon / Jeong, Hyun Cheol / Youm, Heung Youl et al. | 2009
- 366
-
Practical Broadcast Authentication Using Short-Lived Signatures in WSNsLim, Chae Hoon et al. | 2009