|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 346 occurrences of 205 keywords
|
|
|
Results
Found 586 publication records. Showing 584 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
132 | Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon |
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis |
126 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
111 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
111 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
102 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
90 | Ethan Hadar, Irit Hadar |
The composition refactoring triangle (CRT) practical toolkit: from spaghetti to lasagna. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
anti-patterns, architecture centric evolution, design, tracking, requirements, methodology, refactoring, traceability |
88 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
87 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
78 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
78 | Sining Liu, Brian King, Wei Wang 0003 |
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
algorithm, smart card, RSA, Chinese Remainder Theorem |
78 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
78 | Yuxiu Cao, Chunxiao Xing, Long Tang, Lizhu Zhou |
A New CSCW Prototype System for Color CRT CAD/CAM. |
CSCWD |
2001 |
DBLP DOI BibTeX RDF |
|
73 | Shaoqiang Bi, Warren J. Gross |
The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Baodong Qin, Ming Li, Fanyu Kong |
Cryptanalysis of a Type of CRT-Based RSA Algorithms. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL |
66 | Wu Woan Kim, Sang-Dong Jang |
Multiplier with Parallel CSA Using CRT's Specific Moduli (2k-1, 2k , 2k+1). |
ICCSA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
A new CRT-RSA algorithm secure against bellcore attacks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack |
66 | Blair MacIntyre, William B. Cowan |
A Practical Approach to Calculating Luminance Contrast on a CRT. |
ACM Trans. Graph. |
1992 |
DBLP DOI BibTeX RDF |
|
64 | Ellen Jochemsz, Alexander May 0001 |
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT |
64 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
63 | Masako Omori, Satoshi Hasegawa, Tomoyuki Watanabe, Kazuhiro Fujikake, Masaru Miyao |
Comparison of Measurement of Accommodation between LCD and CRT at the Stereoscopic Vision Gaze. |
HCI (13) |
2009 |
DBLP DOI BibTeX RDF |
binocular and natural viewing, LCD and CRT, display, Accommodation, stereoscopic image |
63 | Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
Second Order, CRT-RSA, Fault Attacks, Countermeasure |
63 | Johannes Blömer, Martin Otto 0002 |
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks |
60 | Yonghong Yang, Zine Abid, Wei Wang 0003, Z. Zhang, C. Yang |
Efficient multi-prime RSA immune against hardware fault attack. |
ISCAS (5) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | B. Parvatha Varthini, S. Valli |
An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
GKC, Logical key Graph, OFT, CRT, Group key, Rekeying |
54 | Chong Hee Kim, Jean-Jacques Quisquater |
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
|
54 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Steve Langer, Brian J. Bartholmai, Kenneth A. Fetterly, Scott Harmsen, William J. Ryan, Bradley James Erickson, Katherine P. Andriole, John A. Carrino |
SCAR R&D Symposium 2003: Comparing the Efficacy of 5-MP CRT Versus 3-MP LCD in the Evaluation of Interstitial Lung Disease. |
J. Digit. Imaging |
2004 |
DBLP DOI BibTeX RDF |
kappa, interstitial lung disease, image quality, displays, ROC, receiver operating characteristic |
54 | Elizabeth A. Krupinski, Jeffrey Johnson, Hans Roehrig, John Nafziger, Jiahua Fan, Jeffrey Lubin |
Use of a Human Visual System Model to Predict Observer Performance with CRT vs LCD Display of Images. |
J. Digit. Imaging |
2004 |
DBLP DOI BibTeX RDF |
observer performance, digital display, Vision model |
48 | Shreyas Sundaram, Christoforos N. Hadjicostis |
Fault-Tolerant Convolution Via Chinese Remainder Codes Constructed From Non-Coprime Moduli. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Rui Gong, Kui Dai, Zhiying Wang 0003 |
Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context Saving. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Crt Lozej |
Spectral Form Factor and Dynamical Localization. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
43 | Crt Gerlec, Gordana Rakic, Zoran Budimac, Marjan Hericko |
A programming language independent framework for metrics-based software evolution and analysis. |
Comput. Sci. Inf. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Andrej Krajnc, Marjan Hericko, Crt Gerlec, Uros Goljat, Gregor Polancic |
Experimental investigation of the quality and productivity of software factories based development. |
Comput. Sci. Inf. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Zoran Budimac, Gordana Rakic, Marjan Hericko, Crt Gerlec |
Towards the Better Software Metrics Tool. |
CSMR |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Crt Gerlec, Marjan Hericko |
Analyzing Structural Software Changes: A Case Study. |
BCI (Local) |
2012 |
DBLP BibTeX RDF |
|
42 | Nicolas Duchateau, Mathieu De Craene, Etel Silva, Marta Sitges, Bart H. Bijnens, Alejandro F. Frangi |
Septal Flash Assessment on CRT Candidates Based on Statistical Atlases of Motion. |
MICCAI (1) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Yu-Chen Kuo, Chih-Nung Chen |
CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, Multicast, Chinese Remainder Theorem, Power-Saving |
42 | Alexandre Berzati, Cécile Canovas, Louis Goubin |
In(security) Against Fault Injection Attacks for CRT-RSA Implementations. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Sylvain Tourancheau, Patrick Le Callet, Dominique Barba |
Impact of the Resolution on the Difference of Perceptual Video Quality Between CRT and LCD. |
ICIP (3) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Daniel Bleichenbacher, Alexander May 0001 |
New Attacks on RSA with Small Secret CRT-Exponents. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, RSA, lattices |
42 | Chiara Del Frate, Alexia Bestagno, Viviana Londero, Raffaella Pozzi Mucelli, Valerio Salomoni, Massimo Bazzocchi |
Comparison Between CRT and LCD Displays for Full-Field-Digital-Mammography (FFDM) Interpretation. |
Digital Mammography / IWDM |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Hirofumi Muratani |
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hajime Watanabe, Takashi Kitagawa |
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Jean-Sébastien Coron, Christophe Giraud 0001, Nicolas Morin, Gilles Piret, David Vigilant |
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
CRT-RSA, Fault Attacks |
39 | Richard Conway 0001, John S. Nelson |
Fast Converter for 3 Moduli RNS Using New Property of CRT. |
IEEE Trans. Computers |
1999 |
DBLP DOI BibTeX RDF |
Residue number system (RNS) converter, Chinese remainder theorem (CRT) |
36 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
36 | Furong Wang, Yasha Liu, Lai Tu, Peng Zhang |
Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
packet level performance, call level performance, user mobility, cell residence time |
36 | Kamer Kaya, Ali Aydin Selçuk |
Robust Threshold Schemes Based on the Chinese Remainder Theorem. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal |
36 | Rami Rom, Jacob Erel, Michael Glikson, Randy A. Lieberman, Kobi Rosenblum, Ofer Binah, Ran Ginosar, David L. Hayes 0001 |
Adaptive Cardiac Resynchronization Therapy Device Based on Spiking Neurons Architecture and Reinforcement Learning Scheme. |
IEEE Trans. Neural Networks |
2007 |
DBLP DOI BibTeX RDF |
|
36 | B. Parvatha Varthini, S. Valli |
Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol. |
ICCTA |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Jari Takatalo, Jukka Häkkinen, Jeppe Komulainen, Heikki Särkelä, Göte Nyman |
The impact of the display type and content to a game adaptation. |
Mobile HCI |
2006 |
DBLP DOI BibTeX RDF |
mobile display, user experience, digital games |
36 | Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen |
An Efficient Decryption Method for RSA Cryptosystem. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Piet Claus, Bart H. Bijnens, Ole-Alexander Breithardt, George R. Sutherland |
Why Ischemic Hearts Respond Less to Cardiac Resynchronisation Therapy. A Modeling Study. |
FIMH |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Mohamed A. Gomaa, Chad Scarbrough, Irith Pomeranz, T. N. Vijaykumar |
Transient-Fault Recovery for Chip Multiprocessors. |
ISCA |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura |
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation |
36 | Janusz Konrad, Bertrand Lacotte, Eric Dubois 0002 |
Cancellation of image crosstalk in time-sequential displays of stereoscopic video. |
IEEE Trans. Image Process. |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Walter A. Fischer |
The synergistic combination of an oscilloscope and a microprocessor. |
AFIPS National Computer Conference |
1975 |
DBLP DOI BibTeX RDF |
|
36 | Juan Francisco Gomez, Beatriz Trénor, Rafael Sebastián |
Prediction of CRT Activation Sequence by Personalization of Biventricular Models from Electroanatomical Maps. |
STACOM@MICCAI |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Svyatoslav Khamzin, Arsenii Dokuchaev, Olga Solovyova |
Prediction of CRT Response on Personalized Computer Models. |
STACOM@MICCAI |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Oscar Camara 0001 |
Best (and Worst) Practices for Organizing a Challenge on Cardiac Biophysical Models During AI Summer: The CRT-EPiggy19 Challenge. |
STACOM@MICCAI |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi |
CRT-KPS: A Key Predistribution Schemes Using CRT. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
34 | Petra Wohlmacher |
Digital certificates: a survey of revocation methods. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP |
33 | Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews |
Chinese remainder theorem based group key management. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management |
33 | Amarpreet S. Chawla, Hans Roehrig, Jeffrey J. Rodriguez, Jiahua Fan |
Determining the MTF of Medical Imaging Displays Using Edge Techniques. |
J. Digit. Imaging |
2005 |
DBLP DOI BibTeX RDF |
Cathode ray tube (CRT), liquid crystal display (LCD), modulation transfer function (MTF), edge-spread function (ESF), line-spread function (LSF), Gans' method, low-pass differentiator, image quality |
30 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
30 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
30 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
30 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
30 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Markus G. Kuhn |
Optical Time-Domain Eavesdropping Risks of CRT Displays. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST |
30 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
30 | John Whiting, Sandy Newman |
Microprocessors in CRT terminals. |
AFIPS National Computer Conference |
1975 |
DBLP DOI BibTeX RDF |
|
24 | Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo |
A novel reliable and energy-saving forwarding technique for wireless sensor networks. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
packet splitting, reliability, energy efficiency |
24 | Maxime Sermesant, Florence Billet, Radomír Chabiniok, Tommaso Mansi, Phani Chinchapatnam, Philippe Moireau, Jean-Marc Peyrat, Kawal S. Rhode, Matthew Ginks, Pier Lambiase, Simon R. Arridge, Hervé Delingette, Michel Sorine, C. Aldo Rinaldi, Dominique Chapelle, Reza Razavi, Nicholas Ayache |
Personalised Electromechanical Model of the Heart for the Prediction of the Acute Effects of Cardiac Resynchronisation Therapy. |
FIMH |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Nan Jiang 0009, John Kim, William J. Dally |
Indirect adaptive routing on large scale interconnection networks. |
ISCA |
2009 |
DBLP DOI BibTeX RDF |
dragonfly, routing, interconnection networks |
24 | Shyong Jian Shyu, Ying-Ru Chen |
Threshold Secret Image Sharing by Chinese Remainder Theorem. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xin Liu, Xiaoxia Wan |
Display Color Management and Soft Proofing. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Min Huang, Hao-Xue Liu, Ning-Fang Liao |
Comparative Study of Just-Noticeable Color Differences Using Reflective and Self-Luminous Color Stimuli. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako |
A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
Compromising Emanation, Side Channel Ana- lysis, Electromagnetic Radiation, TEMPEST |
24 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. |
eCrime Researchers Summit |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
24 | Masako Omori, Satoshi Hasegawa, Masaru Miyao, Masami Choui, Hiroshi Tamura |
Brain Activities Related to Legibility of Text, Studied by Means of Near Infrared Spectroscopy. |
HCI (8) |
2007 |
DBLP DOI BibTeX RDF |
visual observation, tap a button, operate a mobile phone, text entry, human interface, near infrared spectroscopy, brain activities |
24 | M. S. Sricharan, Vaidehi V. |
A Pragmatic Analysis of User Mobility Patterns in Macrocellular Wireless Networks. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Roy Kerckhoffs, Andrew D. McCulloch, Jeffrey H. Omens, Lawrence J. Mulligan |
Effect of Pacing Site and Infarct Location on Regional Mechanics and Global Hemodynamics in a Model Based Study of Heart Failure. |
FIMH |
2007 |
DBLP DOI BibTeX RDF |
hemodynamics, 3D electromechanics, ventricular pacing, mechanics |
24 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 |
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder |
24 | Pramod Kumar Meher, Jagdish Chandra Patra |
A new approach to secure distributed storage, sharing and dissemination of digital image. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Tom Kimpe, Albert Xthona, Paul Matthijs, Lode De Paepe |
Solution for Nonuniformities and Spatial Noise in Medical LCD Displays by Using Pixel-Based Correction. |
J. Digit. Imaging |
2005 |
DBLP DOI BibTeX RDF |
noise, mammography, compensation, pixel, uniformity, medical, LCD |
24 | Heng Huang, Li Shen 0001, Fillia Makedon, Sheng Zhang 0004, Mark Greenberg, Ling Gao, Justin D. Pearlman |
A clustering-based approach for prediction of cardiac resynchronization therapy. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
cardiac resynchronization therapy, computer assisted diagnosis and prognosis, data mining, clustering |
24 | Heng Huang, Li Shen 0001, Rong Zhang, Fillia Makedon, Bruce Hettleman, Justin D. Pearlman |
A Prediction Framework for Cardiac Resynchronization Therapy Via 4D Cardiac Motion Analysis. |
MICCAI |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim |
An Expert System Development for Operating Procedure Monitoring of PWR Plants. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
general operating procedures, PWR, Expert systems, knowledge bases |
24 | Patrick Ledda, Greg Ward, Alan Chalmers |
A wide field, high dynamic range, stereographic viewer. |
GRAPHITE |
2003 |
DBLP DOI BibTeX RDF |
dynamic range, tone reproduction |
24 | Wieland Fischer, Jean-Pierre Seifert |
Note on Fast Computation of Secret RSA Exponents. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation |
24 | Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu |
RSA cryptosystem design based on the Chinese remainder theorem. |
ASP-DAC |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai |
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
24 | Radu I. Campeanu, John D. McFall |
Colour monitor calibration based on CIE standards. |
CASCON |
1993 |
DBLP BibTeX RDF |
|
24 | Mike Stokes, Mark D. Fairchild, Roy S. Berns |
Precision Requirements for Digital Color Reproduction. |
ACM Trans. Graph. |
1992 |
DBLP DOI BibTeX RDF |
color science, image science, color, color reproduction, color correction |
Displaying result #1 - #100 of 584 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|