نتایج جستجو برای: dental leakages

تعداد نتایج: 162691  

2014
Woong Cheul Lee Weon Jin Ko Jun-Hyung Cho Tae Hee Lee Seong Ran Jeon Hyun Gun Kim Joo Young Cho

Recently, increasingly invasive therapeutic endoscopic procedures and more complex gastrointestinal surgeries such as endoscopic mucosal resection, endoscopic submucosal dissection, and novel laparoscopic approaches have resulted in endoscopists being confronted more frequently with perforations, fistulas, and anastomotic leakages, for which nonsurgical closure is desired. In this article, we p...

2010
Xuebing Zhou Arjan Kuijper Christoph Busch

The human face is one of the most important biometric modalities for automatic authentication. Three-dimensional face recognition exploits facial surface information. In comparison to illumination based 2D face recognition, it has good robustness and high fake resistance, so that it can be used in high security areas. Nevertheless, as in other common biometric systems, potential risks of identi...

2008
François-Xavier Standaert Cédric Archambeau

The power consumption and electromagnetic radiation are among the most extensively used side-channels for analyzing physically observable cryptographic devices. This paper tackles three important questions in this respect. First, we compare the effectiveness of these two side-channels. We investigate the common belief that electromagnetic leakages lead to more powerful attacks than their power ...

2011
Balaji Thoshkahna Ramakrishnan R. Kalpathi

In this paper we propose a postprocessing technique for a spectrogram diffusion based harmonic/percussion decomposition algorithm. The proposed technique removes harmonic instrument leakages in the percussion enhanced outputs of the baseline algorithm. The technique uses median filtering and an adaptive detection of percussive segments in subbands followed by piecewise signal reconstruction usi...

Journal: :IACR Cryptology ePrint Archive 2016
Francesco Berti François Koeune Olivier Pereira Thomas Peters François-Xavier Standaert

Leakage-resilience and misuse-resistance are two important properties for the deployment of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due to side-channel leakages and misused randomness. In this paper, we discuss their interactions and incompatibilities. For this purpose, we first show a generic composition mode of a MAC with an encryption schem...

Journal: :Economic Development and Cultural Change 1977

2010
Mathieu Renauld François-Xavier Standaert

By combining the extraction of side-channel information leakages with classical cryptanalysis techniques, the recently introduced Algebraic SideChannel Attacks trade a part of the data complexity in standard DPA attacks for more computations. But predicting the success rate of such attacks is made harder because of the numerous parameters that come into play when solving large algebraic systems...

Journal: :CoRR 2017
Gorka Irazoqui Apecechea Kai Cong Xiaofei Guo Hareesh Khattri Arun K. Kanuparthi Thomas Eisenbarth Berk Sunar

This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers vulnerabilities that are hard to find with other techniques, observed as exploitable leakage. The methodology works by identifying secret dependent memory and introducing forced evictions inside potentially vulnerable code to obtain cache traces that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید