|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 346 occurrences of 205 keywords
|
|
|
Results
Found 586 publication records. Showing 584 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
132 | Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon |
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 53-61, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis |
126 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 397-413, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
111 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 285-296, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
111 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 374-388, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
102 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 461-472, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
90 | Ethan Hadar, Irit Hadar |
The composition refactoring triangle (CRT) practical toolkit: from spaghetti to lasagna. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, pp. 786-797, 2006, ACM, 1-59593-491-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anti-patterns, architecture centric evolution, design, tracking, requirements, methodology, refactoring, traceability |
88 | ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon |
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 150-158, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Smart card, RSA, Side channel attack, DPA, CRT, Fault attack |
87 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 473-484, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
78 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 177-185, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
78 | Sining Liu, Brian King, Wei Wang 0003 |
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 51-60, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
algorithm, smart card, RSA, Chinese Remainder Theorem |
78 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 383-397, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
78 | Yuxiu Cao, Chunxiao Xing, Long Tang, Lizhu Zhou |
A New CSCW Prototype System for Color CRT CAD/CAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2001, July 12-14, 2001, London, Ontario, Canada, pp. 542-545, 2001, IEEE, 0660184931. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
73 | Shaoqiang Bi, Warren J. Gross |
The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 57(12), pp. 1624-1632, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Baodong Qin, Ming Li, Fanyu Kong |
Cryptanalysis of a Type of CRT-Based RSA Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(2), pp. 214-221, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL |
66 | Wu Woan Kim, Sang-Dong Jang |
Multiplier with Parallel CSA Using CRT's Specific Moduli (2k-1, 2k , 2k+1). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part II, pp. 216-225, 2004, Springer, 3-540-22056-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
66 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
A new CRT-RSA algorithm secure against bellcore attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 311-320, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack |
66 | Blair MacIntyre, William B. Cowan |
A Practical Approach to Calculating Luminance Contrast on a CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 11(4), pp. 336-347, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
64 | Ellen Jochemsz, Alexander May 0001 |
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 395-411, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT |
64 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 228-243, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
63 | Masako Omori, Satoshi Hasegawa, Tomoyuki Watanabe, Kazuhiro Fujikake, Masaru Miyao |
Comparison of Measurement of Accommodation between LCD and CRT at the Stereoscopic Vision Gaze. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (13) ![In: Virtual and Mixed Reality, Third International Conference, VMR 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 90-96, 2009, Springer, 978-3-642-02770-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
binocular and natural viewing, LCD and CRT, display, Accommodation, stereoscopic image |
63 | Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra |
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 68-83, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Second Order, CRT-RSA, Fault Attacks, Countermeasure |
63 | Johannes Blömer, Martin Otto 0002 |
Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 13-23, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks |
60 | Yonghong Yang, Zine Abid, Wei Wang 0003, Z. Zhang, C. Yang |
Efficient multi-prime RSA immune against hardware fault attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 4649-4652, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | B. Parvatha Varthini, S. Valli |
An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 33-43, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GKC, Logical key Graph, OFT, CRT, Group key, Rekeying |
54 | Chong Hee Kim, Jean-Jacques Quisquater |
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 215-228, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim |
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, First International Conference, HPCC 2005, Sorrento, Italy, September 21-23, 2005, Proceedings, pp. 549-554, 2005, Springer, 3-540-29031-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
54 | Steve Langer, Brian J. Bartholmai, Kenneth A. Fetterly, Scott Harmsen, William J. Ryan, Bradley James Erickson, Katherine P. Andriole, John A. Carrino |
SCAR R&D Symposium 2003: Comparing the Efficacy of 5-MP CRT Versus 3-MP LCD in the Evaluation of Interstitial Lung Disease. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 17(3), pp. 149-157, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
kappa, interstitial lung disease, image quality, displays, ROC, receiver operating characteristic |
54 | Elizabeth A. Krupinski, Jeffrey Johnson, Hans Roehrig, John Nafziger, Jiahua Fan, Jeffrey Lubin |
Use of a Human Visual System Model to Predict Observer Performance with CRT vs LCD Display of Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 17(4), pp. 258-263, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
observer performance, digital display, Vision model |
48 | Shreyas Sundaram, Christoforos N. Hadjicostis |
Fault-Tolerant Convolution Via Chinese Remainder Codes Constructed From Non-Coprime Moduli. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 56(9), pp. 4244-4254, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Rui Gong, Kui Dai, Zhiying Wang 0003 |
Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context Saving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 148-153, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Crt Lozej |
Spectral Form Factor and Dynamical Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(3), pp. 451, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
43 | Crt Gerlec, Gordana Rakic, Zoran Budimac, Marjan Hericko |
A programming language independent framework for metrics-based software evolution and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Inf. Syst. ![In: Comput. Sci. Inf. Syst. 9(3), pp. 1155-1186, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Andrej Krajnc, Marjan Hericko, Crt Gerlec, Uros Goljat, Gregor Polancic |
Experimental investigation of the quality and productivity of software factories based development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Inf. Syst. ![In: Comput. Sci. Inf. Syst. 9(2), pp. 667-689, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Zoran Budimac, Gordana Rakic, Marjan Hericko, Crt Gerlec |
Towards the Better Software Metrics Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 16th European Conference on Software Maintenance and Reengineering, CSMR 2012, Szeged, Hungary, March 27-30, 2012, pp. 491-494, 2012, IEEE Computer Society, 978-1-4673-0984-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
43 | Crt Gerlec, Marjan Hericko |
Analyzing Structural Software Changes: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCI (Local) ![In: Local Proceedings of the Fifth Balkan Conference in Informatics, 2012, BCI '12, Novi Sad, Serbia, September 16-20, 2012, pp. 117-120, 2012, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
42 | Nicolas Duchateau, Mathieu De Craene, Etel Silva, Marta Sitges, Bart H. Bijnens, Alejandro F. Frangi |
Septal Flash Assessment on CRT Candidates Based on Statistical Atlases of Motion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICCAI (1) ![In: Medical Image Computing and Computer-Assisted Intervention - MICCAI 2009, 12th International Conference, London, UK, September 20-24, 2009, Proceedings, Part II, pp. 759-766, 2009, Springer, 978-3-642-04270-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Yu-Chen Kuo, Chih-Nung Chen |
CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2008), 11-13 June 2008, Taichung, Taiwan, pp. 332-337, 2008, IEEE Computer Society, 978-0-7695-3158-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ad hoc network, Multicast, Chinese Remainder Theorem, Power-Saving |
42 | Alexandre Berzati, Cécile Canovas, Louis Goubin |
In(security) Against Fault Injection Attacks for CRT-RSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 101-107, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Sylvain Tourancheau, Patrick Le Callet, Dominique Barba |
Impact of the Resolution on the Difference of Perceptual Video Quality Between CRT and LCD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 441-444, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Daniel Bleichenbacher, Alexander May 0001 |
New Attacks on RSA with Small Secret CRT-Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 1-13, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, RSA, lattices |
42 | Chiara Del Frate, Alexia Bestagno, Viviana Londero, Raffaella Pozzi Mucelli, Valerio Salomoni, Massimo Bazzocchi |
Comparison Between CRT and LCD Displays for Full-Field-Digital-Mammography (FFDM) Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Mammography / IWDM ![In: Digital Mammography, 8th International Workshop, IWDM 2006, Manchester, UK, June 18-21, 2006, Proceedings, pp. 576-584, 2006, Springer, 3-540-35625-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Hirofumi Muratani |
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers, pp. 282-292, 2004, Springer, 3-540-24207-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hajime Watanabe, Takashi Kitagawa |
An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 173-183, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Jean-Sébastien Coron, Christophe Giraud 0001, Nicolas Morin, Gilles Piret, David Vigilant |
Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 89-96, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
CRT-RSA, Fault Attacks |
39 | Richard Conway 0001, John S. Nelson |
Fast Converter for 3 Moduli RNS Using New Property of CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 48(8), pp. 852-860, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Residue number system (RNS) converter, Chinese remainder theorem (CRT) |
36 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 414-425, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
36 | Furong Wang, Yasha Liu, Lai Tu, Peng Zhang |
Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 234-240, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
packet level performance, call level performance, user mobility, cell residence time |
36 | Kamer Kaya, Ali Aydin Selçuk |
Robust Threshold Schemes Based on the Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 94-108, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal |
36 | Rami Rom, Jacob Erel, Michael Glikson, Randy A. Lieberman, Kobi Rosenblum, Ofer Binah, Ran Ginosar, David L. Hayes 0001 |
Adaptive Cardiac Resynchronization Therapy Device Based on Spiking Neurons Architecture and Reinforcement Learning Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Neural Networks ![In: IEEE Trans. Neural Networks 18(2), pp. 542-550, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | B. Parvatha Varthini, S. Valli |
Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCTA ![In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 5-7 March 2007, Kolkata, India, pp. 176-181, 2007, IEEE Computer Society, 978-0-7695-2770-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Jari Takatalo, Jukka Häkkinen, Jeppe Komulainen, Heikki Särkelä, Göte Nyman |
The impact of the display type and content to a game adaptation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 8th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2006, Helsinki, Finland, September 12-15, 2006, pp. 17-20, 2006, ACM, 1-59593-390-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
mobile display, user experience, digital games |
36 | Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen |
An Efficient Decryption Method for RSA Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 585-590, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Piet Claus, Bart H. Bijnens, Ole-Alexander Breithardt, George R. Sutherland |
Why Ischemic Hearts Respond Less to Cardiac Resynchronisation Therapy. A Modeling Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIMH ![In: Functional Imaging and Modeling of the Heart, Second International Workshop, FIMH 2003, Lyon, France, June 5-6, 2003 Proceedings, pp. 287-294, 2003, Springer, 3-540-40262-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Mohamed A. Gomaa, Chad Scarbrough, Irith Pomeranz, T. N. Vijaykumar |
Transient-Fault Recovery for Chip Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 30th International Symposium on Computer Architecture (ISCA 2003), 9-11 June 2003, San Diego, California, USA, pp. 98-109, 2003, IEEE Computer Society, 0-7695-1945-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura |
Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 364-376, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation |
36 | Janusz Konrad, Bertrand Lacotte, Eric Dubois 0002 |
Cancellation of image crosstalk in time-sequential displays of stereoscopic video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 9(5), pp. 897-908, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 103-117, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 204-211, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Walter A. Fischer |
The synergistic combination of an oscilloscope and a microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1975 National Computer Conference, 19-22 May 1975, Anaheim, CA, USA, pp. 23-32, 1975, AFIPS Press, 978-1-4503-7919-9. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
36 | Juan Francisco Gomez, Beatriz Trénor, Rafael Sebastián |
Prediction of CRT Activation Sequence by Personalization of Biventricular Models from Electroanatomical Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACOM@MICCAI ![In: Statistical Atlases and Computational Models of the Heart. Multi-Sequence CMR Segmentation, CRT-EPiggy and LV Full Quantification Challenges - 10th International Workshop, STACOM 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 13, 2019, Revised Selected Papers, pp. 342-351, 2019, Springer, 978-3-030-39073-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Svyatoslav Khamzin, Arsenii Dokuchaev, Olga Solovyova |
Prediction of CRT Response on Personalized Computer Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACOM@MICCAI ![In: Statistical Atlases and Computational Models of the Heart. Multi-Sequence CMR Segmentation, CRT-EPiggy and LV Full Quantification Challenges - 10th International Workshop, STACOM 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 13, 2019, Revised Selected Papers, pp. 352-363, 2019, Springer, 978-3-030-39073-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Oscar Camara 0001 |
Best (and Worst) Practices for Organizing a Challenge on Cardiac Biophysical Models During AI Summer: The CRT-EPiggy19 Challenge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACOM@MICCAI ![In: Statistical Atlases and Computational Models of the Heart. Multi-Sequence CMR Segmentation, CRT-EPiggy and LV Full Quantification Challenges - 10th International Workshop, STACOM 2019, Held in Conjunction with MICCAI 2019, Shenzhen, China, October 13, 2019, Revised Selected Papers, pp. 329-341, 2019, Springer, 978-3-030-39073-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi |
CRT-KPS: A Key Predistribution Schemes Using CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 821-830, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 185-203, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
34 | Petra Wohlmacher |
Digital certificates: a survey of revocation methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 111-114, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP |
33 | Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews |
Chinese remainder theorem based group key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 45th Annual Southeast Regional Conference, 2007, Winston-Salem, North Carolina, USA, March 23-24, 2007, pp. 266-271, 2007, ACM, 978-1-59593-629-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management |
33 | Amarpreet S. Chawla, Hans Roehrig, Jeffrey J. Rodriguez, Jiahua Fan |
Determining the MTF of Medical Imaging Displays Using Edge Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 18(4), pp. 296-310, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cathode ray tube (CRT), liquid crystal display (LCD), modulation transfer function (MTF), edge-spread function (ESF), line-spread function (LSF), Gans' method, low-pass differentiator, image quality |
30 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 128-140, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
30 | Arnaud Boscher, Robert Naciri, Emmanuel Prouff |
CRT RSA Algorithm Protected Against Fault Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 229-243, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation |
30 | Chong Hee Kim, Jean-Jacques Quisquater |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 21-29, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 92-97, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
30 | Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard |
Attacking Unbalanced RSA-CRT Using SPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 254-268, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Markus G. Kuhn |
Optical Time-Domain Eavesdropping Risks of CRT Displays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 3-18, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST |
30 | Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert |
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 260-275, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack |
30 | John Whiting, Sandy Newman |
Microprocessors in CRT terminals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1975 National Computer Conference, 19-22 May 1975, Anaheim, CA, USA, pp. 41-45, 1975, AFIPS Press, 978-1-4503-7919-9. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
24 | Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo |
A novel reliable and energy-saving forwarding technique for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2009, New Orleans, LA, USA, May 18-21, 2009, pp. 269-278, 2009, ACM, 978-1-60558-531-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
packet splitting, reliability, energy efficiency |
24 | Maxime Sermesant, Florence Billet, Radomír Chabiniok, Tommaso Mansi, Phani Chinchapatnam, Philippe Moireau, Jean-Marc Peyrat, Kawal S. Rhode, Matthew Ginks, Pier Lambiase, Simon R. Arridge, Hervé Delingette, Michel Sorine, C. Aldo Rinaldi, Dominique Chapelle, Reza Razavi, Nicholas Ayache |
Personalised Electromechanical Model of the Heart for the Prediction of the Acute Effects of Cardiac Resynchronisation Therapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIMH ![In: Functional Imaging and Modeling of the Heart, 5th International Conference, FIMH 2009, Nice, France, June 3-5, 2009. Proceedings, pp. 239-248, 2009, Springer, 978-3-642-01931-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Nan Jiang 0009, John Kim, William J. Dally |
Indirect adaptive routing on large scale interconnection networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 36th International Symposium on Computer Architecture (ISCA 2009), June 20-24, 2009, Austin, TX, USA, pp. 220-231, 2009, ACM, 978-1-60558-526-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dragonfly, routing, interconnection networks |
24 | Shyong Jian Shyu, Ying-Ru Chen |
Threshold Secret Image Sharing by Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1332-1337, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xin Liu, Xiaoxia Wan |
Display Color Management and Soft Proofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (6) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 6: Graphic Communication / Other Applications, December 12-14, 2008, Wuhan, China, pp. 290-293, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Min Huang, Hao-Xue Liu, Ning-Fang Liao |
Comparative Study of Just-Noticeable Color Differences Using Reflective and Self-Luminous Color Stimuli. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (6) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 6: Graphic Communication / Other Applications, December 12-14, 2008, Wuhan, China, pp. 298-301, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako |
A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers, pp. 1-14, 2008, Springer, 978-3-540-88960-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Compromising Emanation, Side Channel Ana- lysis, Electromagnetic Radiation, TEMPEST |
24 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong |
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eCrime Researchers Summit ![In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007, pp. 70-81, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security |
24 | Masako Omori, Satoshi Hasegawa, Masaru Miyao, Masami Choui, Hiroshi Tamura |
Brain Activities Related to Legibility of Text, Studied by Means of Near Infrared Spectroscopy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (8) ![In: Human Interface and the Management of Information. Methods, Techniques and Tools in Information Design, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings Part I, pp. 894-902, 2007, Springer, 978-3-540-73344-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
visual observation, tap a button, operate a mobile phone, text entry, human interface, near infrared spectroscopy, brain activities |
24 | M. S. Sricharan, Vaidehi V. |
A Pragmatic Analysis of User Mobility Patterns in Macrocellular Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-9, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Roy Kerckhoffs, Andrew D. McCulloch, Jeffrey H. Omens, Lawrence J. Mulligan |
Effect of Pacing Site and Infarct Location on Regional Mechanics and Global Hemodynamics in a Model Based Study of Heart Failure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIMH ![In: Functional Imaging and Modeling of the Heart, 4th International Conference, FIMH 2007, Salt Lake City, UT, USA, June 7-9, 2007, Proceedings, pp. 350-360, 2007, Springer, 978-3-540-72906-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hemodynamics, 3D electromechanics, ventricular pacing, mechanics |
24 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 982-986, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 |
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 81-93, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder |
24 | Pramod Kumar Meher, Jagdish Chandra Patra |
A new approach to secure distributed storage, sharing and dissemination of digital image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Tom Kimpe, Albert Xthona, Paul Matthijs, Lode De Paepe |
Solution for Nonuniformities and Spatial Noise in Medical LCD Displays by Using Pixel-Based Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 18(3), pp. 209-218, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
noise, mammography, compensation, pixel, uniformity, medical, LCD |
24 | Heng Huang, Li Shen 0001, Fillia Makedon, Sheng Zhang 0004, Mark Greenberg, Ling Gao, Justin D. Pearlman |
A clustering-based approach for prediction of cardiac resynchronization therapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 260-266, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cardiac resynchronization therapy, computer assisted diagnosis and prognosis, data mining, clustering |
24 | Heng Huang, Li Shen 0001, Rong Zhang, Fillia Makedon, Bruce Hettleman, Justin D. Pearlman |
A Prediction Framework for Cardiac Resynchronization Therapy Via 4D Cardiac Motion Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICCAI ![In: Medical Image Computing and Computer-Assisted Intervention - MICCAI 2005, 8th International Conference, Palm Springs, CA, USA, October 26-29, 2005, Proceedings, Part I, pp. 704-711, 2005, Springer, 3-540-29327-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim |
An Expert System Development for Operating Procedure Monitoring of PWR Plants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 483-490, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
general operating procedures, PWR, Expert systems, knowledge bases |
24 | Patrick Ledda, Greg Ward, Alan Chalmers |
A wide field, high dynamic range, stereographic viewer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRAPHITE ![In: Proceedings of the 1st International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2003, Melbourne, Australia, February 11-14, 2003, pp. 237-244, 2003, ACM, 1-58113-578-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
dynamic range, tone reproduction |
24 | Wieland Fischer, Jean-Pierre Seifert |
Note on Fast Computation of Secret RSA Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 136-143, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation |
24 | Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu |
RSA cryptosystem design based on the Chinese remainder theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of ASP-DAC 2001, Asia and South Pacific Design Automation Conference 2001, January 30-February 2, 2001, Yokohama, Japan, pp. 391-395, 2001, ACM, 0-7803-6634-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai |
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 81-102, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Johann Großschädl |
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 384-393, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency |
24 | Radu I. Campeanu, John D. McFall |
Colour monitor calibration based on CIE standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, October 24-28, 1993, Toronto, Ontario, Canada, 2 Volumes, pp. 1091-1118, 1993, IBM. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
24 | Mike Stokes, Mark D. Fairchild, Roy S. Berns |
Precision Requirements for Digital Color Reproduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 11(4), pp. 406-422, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
color science, image science, color, color reproduction, color correction |
Displaying result #1 - #100 of 584 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|