Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,369,745 papers from all fields of science
Search
Sign In
Create Free Account
Zeroisation
Known as:
Zeroize
, Zeroization
, Zeroise
Expand
In cryptography, zeroisation (also spelled zeroization) is the practice of erasing sensitive parameters (electronically stored data, cryptographic…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Compiler
Computer security
Critical Security Parameter
Cryptography
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
Dana Dachman-Soled
,
Jonathan Katz
,
V. Rao
Theory of Cryptography Conference
2015
Corpus ID: 13960031
Cryptographic protocols with adaptive security ensure that security holds against an adversary who can dynamically determine…
Expand
2014
2014
Demons: Maxwell's demon, Szilard's engine and Landauer's erasure-dissipation
L. Kish
,
C. Granqvist
,
S. Khatri
,
He Wen
2014
Corpus ID: 7388234
This talk addressed the following questions in the public debate at HoTPI: (i) energy dissipation limits of switches, memories…
Expand
2014
2014
Secure erasure codes with partial decodability
Son Hoang Dau
,
Wentu Song
,
C. Yuen
IEEE International Conference on Communications…
2014
Corpus ID: 1865792
The MDS property (aka the k-out-of-n property) requires that if a file is split into several symbols and subsequently encoded…
Expand
2012
2012
Differential Power Analysis using wavelet decomposition
Hiren J. Patel
,
R. Baldwin
IEEE Military Communications Conference
2012
Corpus ID: 2054885
Differential Power Analysis (DPA) has been successfully used against crytographic hardware to extract the secret key in a non…
Expand
2011
2011
Simultaneous Clearing of Energy and Reserves in Multi-Area Markets Under Mixed Pricing Rules
A. Vlachos
,
P. Biskas
IEEE Transactions on Power Systems
2011
Corpus ID: 36140116
The integration of the spot electricity markets in Europe shall lead to multi-area power exchanges that will substitute the local…
Expand
2009
2009
The relation between grey relational decision making and grey situation decision making under appropriate conditions
Yong Wei
,
Xinhai Kong
IEEE International Conference on Grey systems and…
2009
Corpus ID: 16942092
The relation between grey relational decision making and grey situation decision making is pointed out in this paper, which…
Expand
2007
2007
ECO chip: Energy Consumption Zeroize Chip with a 953MHz High-Sensitivity Radio Wave Detector for Standby Mode Applications
T. Umeda
,
S. Otaka
IEEE Custom Integrated Circuits Conference
2007
Corpus ID: 14514534
ECO chip (energy consumption zeroize chip) for standby mode applications is presented. ECO chip detects 953 MHz band radio waves…
Expand
2006
2006
Application of Stationary Wavelet Transforms to Ultrasonic Crack Detection
Xianfeng Fan
,
M. Zuo
,
Xiaodong Wang
Canadian Conference on Electrical and Computer…
2006
Corpus ID: 17498302
Ultrasonic-based pulse-echo technique has been widely used for non-destructive crack detection. The noisy ultrasonic signals…
Expand
2006
2006
SEC : A Practical Secure Erasure Coding Scheme for Peer-to-Peer Storage System
Jing Tian
,
Zhi Yang
,
Yafei Dai
2006
Corpus ID: 16582299
Though conventional block cipher is widely used in Peer-to-Peer storage systems, it is insufficient to ensure the confidentiality…
Expand
2000
2000
Adaptively Secure Threshold Cryptography without the Assumption of Erasure
Stanislaw Jarecki
,
Anna Lysyanskaya
2000
Corpus ID: 142905
We exhibit eecient threshold cryptosystems which are secure against adaptive adversaries even when the players cannot erase their…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE