Learn More
In this paper we extend the ideas for differential fault attacks on the RSA cryptosystem (see [4]) to schemes using elliptic curves. We present three different types of attacks that can be used to derive information about the secret key if bit errors can be inserted into the elliptic curve computations in a tamper-proof device. The effectiveness of the(More)
We present a general purpose lossless greyscale image compression method TMW that is based on the use of linear predictors and implicit seg mentation In order to achieve competitive com pression the compression process is split into an analysis step and a coding step In the rst step a set of linear predictors and other parameters suitable for the image is(More)
In recent years most research into lossless and near lossless compression of greyscale images could be characterized as belonging to either of two distinct groups The rst group which is concerned with so called practical algorithms encom passes research into methods that allow compression and decompression with low to moderate computational complexity while(More)
Clustering with swarm-based algorithms is emerging as an alternative to more conventional clustering methods, such as hierarchical clustering and k-means. Ant-based clustering stands out as the most widely used group of swarm-based clustering algorithms. Broadly speaking, there are two main types of ant-based clustering: the first group of methods directly(More)
We present an augmented reality application for mechanics education. It utilizes a recent physics engine developed for the PC gaming market to simulate physical experiments in the domain of mechanics in real time. Students are enabled to actively build own experiments and study them in a three-dimensional virtual world. A variety of tools are provided to(More)
We present a concept for the realization of asymmetric cryptographic techniques in light-weight cryptographic devices and describe an implementation based on elliptic curve cryptography which can be used for authentication in mass applications of RFID tags. Our schemes offer advantages in large decentralized applications with many unobservable readers in(More)