Sciweavers

138 search results - page 16 / 28
» A Practical Secure Physical Random Bit Generator
Sort
View
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 1 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
14 years 8 days ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
14 years 2 days ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof
ISCA
2012
IEEE
280views Hardware» more  ISCA 2012»
11 years 9 months ago
A case for random shortcut topologies for HPC interconnects
—As the scales of parallel applications and platforms increase the negative impact of communication latencies on performance becomes large. Fortunately, modern High Performance C...
Michihiro Koibuchi, Hiroki Matsutani, Hideharu Ama...
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 6 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija