All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Masking
In Electronic Health Records (EHR’s) data masking, or controlled access, is the process of concealing patient health data from certain healthcare…
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1967-2017
0
50
100
1967
2017
Related topics
Related topics
6 relations
Confidentiality
Cryptographic hash function
Data masking
Encryption
(More)
Broader (1)
Information privacy
Related mentions per year
Related mentions per year
1949-2018
1940
1960
1980
2000
2020
Masking
Encryption
Confidentiality
Privacy
Information privacy
Cryptographic hash function
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Compiler Assisted Masking
Andrew Moss
,
Elisabeth Oswald
,
Dan Page
,
Michael Tunstall
CHES
2012
Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device…
(More)
Is this relevant?
Highly Cited
2011
Highly Cited
2011
A Generalized Unsharp Masking Algorithm
Guang Deng
IEEE Transactions on Image Processing
2011
Enhancement of contrast and sharpness of an image is required in many applications. Unsharp masking is a classical tool for…
(More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Provably Secure Higher-Order Masking of AES
Matthieu Rivain
,
Emmanuel Prouff
CHES
2010
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are…
(More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Template Attacks on Masking - Resistance Is Futile
Elisabeth Oswald
,
Stefan Mangard
CT-RSA
2007
In this article we discuss different types of template attacks on masked implementations. All template attacks that we describe…
(More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
On Between-coefficient Contrast Masking of Dct Basis Functions
Nikolay N. Ponomarenko
,
Flavia Silvestri
,
Karen Egiazarian
,
Marco Carli
,
Jaakko Astola
,
Vladimir V. Lukin
2006
In this paper we propose a simple and effective model of visual between-coefficient contrast masking of DCT basis functions based…
(More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Higher Order Masking of the AES
Kai Schramm
,
Christof Paar
CT-RSA
2006
The development of masking schemes to secure AES implementations against side channel attacks is a topic of ongoing research…
(More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Provably Secure Masking of AES
Johannes Blömer
,
Jorge Guajardo
,
Volker Krummel
Selected Areas in Cryptography
2004
A general method to secure cryptographic algorithms against side-channel attacks is the use of randomization techniques and, in…
(More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Multiplicative Masking and Power Analysis of AES
Jovan Dj. Golic
,
Christophe Tymen
CHES
2002
The recently proposed multiplicative masking countermeasure against power analysis attacks on AES is interesting as it does not…
(More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Neurogenesis in the adult is involved in the formation of trace memories.
Tracey J. Shors
,
George R Miesegaes
,
Alexander Beylin
,
M. Zhao
,
Timothy J. Rydel
,
Edith Gould
Nature
2001
The vertebrate brain continues to produce new neurons throughout life. In the rat hippocampus, several thousand are produced each…
(More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
On Boolean and Arithmetic Masking against Differential Power Analysis
Jean-Sébastien Coron
,
Louis Goubin
CHES
2000
Since the announcement of the Differential Power Analysis (DPA) by Paul Kocher and al., several countermeasures were proposed in…
(More)
Is this relevant?