Sciweavers

BIRTHDAY
2016
Springer
8 years 6 months ago
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
We describe a novel approach to reduce the impact of spoofing by a subtle change in the login process. At the heart of our contribution is the understanding that current anti-spo...
Markus Jakobsson, Hossein Siadati
BIRTHDAY
2016
Springer
8 years 6 months ago
An Improved Differential Attack on Full GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-25...
Nicolas T. Courtois
BIRTHDAY
2016
Springer
8 years 6 months ago
Safe-Errors on SPA Protected Implementations with the Atomicity Technique
ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Crypt...
Pierre-Alain Fouque, Sylvain Guilley, Cédri...
BIRTHDAY
2016
Springer
8 years 6 months ago
Moessner's Theorem: An Exercise in Coinductive Reasoning in Coq
Moessner’s Theorem describes a construction of the sequence of powers (1n , 2n , 3n , . . . ), by repeatedly dropping and summing elements from the sequence of positive natural n...
Robbert Krebbers, Louis Parlant, Alexandra Silva
BIRTHDAY
2016
Springer
8 years 6 months ago
A Small-Step Semantics of a Concurrent Calculus with Goroutines and Deferred Functions
In this paper, we present a small-step operational semantics for a small concurrent language supporting deferred function calls and related constructs in the style of the Go progra...
Martin Steffen
Applied Computing
Top of PageReset Settings