Sciweavers

50808 search results - page 136 / 10162
» A New
Sort
View
ISW
2005
Springer
14 years 2 months ago
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
In this paper, we examine general mechanisms that a covert channel may exploit and derive new minimum requirements for setting up a covert channel. We also propose a new classifica...
Zhenghong Wang, Ruby B. Lee
PVM
2005
Springer
14 years 2 months ago
A Case for New MPI Fortran Bindings
Abstract. The Fortran language has evolved substantially from the Fortran 77 bindings defined in the MPI-1 (Message Passing Interface) standard. Fortran 90 introduced interface bl...
Craig Edward Rasmussen, Jeffrey M. Squyres
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 2 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
ASIACRYPT
2004
Springer
14 years 2 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
14 years 2 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
« Prev « First page 136 / 10162 Last » Next »