Masking

In Electronic Health Records (EHR’s) data masking, or controlled access, is the process of concealing patient health data from certain healthcare… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1967-2017
05010019672017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
  • Guang Deng
  • IEEE Transactions on Image Processing
  • 2011
Enhancement of contrast and sharpness of an image is required in many applications. Unsharp masking is a classical tool for… (More)
  • figure 2
  • table I
  • figure 3
  • figure 4
  • table III
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this article we discuss different types of template attacks on masked implementations. All template attacks that we describe… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper we propose a simple and effective model of visual between-coefficient contrast masking of DCT basis functions based… (More)
  • figure 2
  • table 1
  • figure 3
  • table 3
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The development of masking schemes to secure AES implementations against side channel attacks is a topic of ongoing research… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A general method to secure cryptographic algorithms against side-channel attacks is the use of randomization techniques and, in… (More)
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The recently proposed multiplicative masking countermeasure against power analysis attacks on AES is interesting as it does not… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The vertebrate brain continues to produce new neurons throughout life. In the rat hippocampus, several thousand are produced each… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in… (More)
Is this relevant?