Channel 2

Results: 1182



#Item
291Aquatic ecology / Environmental soil science / Islands / Wetland / Fisheries / Floating island / Water / Seagrass / Ocean thermal energy conversion / Biology / Microbiology / Matter

PHASE 1 CHANNEL GREEN AT NIGHT PHASE 2

Add to Reading List

Source URL: www.bostonlivingwithwater.org

Language: English - Date: 2015-02-11 09:40:31
292Fox News Channel / CNN / School shooting / Radio / Broadcasting / News media / American media

    CRIMINAL  JUSTICE  NEWS  COVERAGE  IN   2013   (Part  2)  

Add to Reading List

Source URL: thecrimereport.s3.amazonaws.com

Language: English - Date: 2014-02-26 11:13:57
293Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
294Commodity channel index

CCI  Visualisa*on  Corner   Phase  2     Philip  Eales,  Kevin  Tildsley,  Andrew  Wayne,     Tim  Day,  Mona  Craven,  Fulvio  Marelli     Planetary  Visio

Add to Reading List

Source URL: cci.esa.int

Language: English - Date: 2014-11-04 01:49:53
    295RSA / Adversary / Cryptographic primitive / Cryptography / Public-key cryptography / Side channel attack

    SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks1,2 Filipe Rosado da-Fonseca Lisbon, Portugal Email:

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-23 06:54:05
    296SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

    An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-12-01 12:22:01
    297CLIMAT / Commodity channel index / Global Monitoring for Environment and Security / Global Observing Systems Information Center / Global Climate Observing System / General Comprehensive Operating System / FAPAR

    ESA_Response_to GCOS_v3_2

    Add to Reading List

    Source URL: cci.esa.int

    Language: English - Date: 2014-06-10 05:50:58
    298Instruction set architectures / Logic design / SystemC / Simulation / Microcontroller / Logic simulation / ARM architecture / Electronic engineering / Digital electronics / Electronic design automation

    Profiled Model Based Power Simulator for Side Channel Evaluation Nicolas Debande1,2 , Ma¨el Berthier1 , Yves Bocktaels1 and Thanh-Ha Le1 1 Morpho

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-16 09:22:52
    299Probability and statistics / Hamming weight / Variance / Advanced Encryption Standard / Statistics / Coding theory / Normal distribution

    Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge1,2 , C´ecile Dumas1 , and Sophie Lambert-Lacroix2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-12-22 11:14:13
    300Linear cryptanalysis / Differential cryptanalysis / ICE / Authenticated encryption / Stream ciphers / Cryptography / Advanced Encryption Standard / Block cipher

    Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Beg¨ ul Bilgin1,2 , Andrey Bogdanov3 , Miroslav Kneˇzevi´c4 , Florian Mendel5 , and Qingju Wang1,6 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-05-04 16:35:21
    UPDATE