Sciweavers

36 search results - page 2 / 8
» Breaking the chain
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ESAW
2005
Springer
14 years 1 months ago
Predicting Exceptions in Agent-Based Supply-Chains
Abstract. Exceptions occur frequently in supply-chains. Consequently, detecting exceptions timely is of great practical value. To enable a timely detection of exceptions, this pape...
Albert Özkohen, Pinar Yolum
ACSAC
2005
IEEE
14 years 1 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
CPAIOR
2009
Springer
14 years 2 months ago
Six Ways of Integrating Symmetries within Non-overlapping Constraints
Abstract: This paper introduces six ways for handling a chain of lexicographic ordering constraint between the origins of identical orthotopes (e.g., rectangles, boxes, hyper-recta...
Magnus Ågren, Nicolas Beldiceanu, Mats Carls...
VTS
1997
IEEE
73views Hardware» more  VTS 1997»
14 years 16 hour ago
Obtaining High Fault Coverage with Circular BIST Via State Skipping
Despite all of the advantages that circular BIST ofsers compared to conventional BIST approaches in terms of low area overhead, simple control logic, and easy insertion, it has se...
Nur A. Touba