Sciweavers

1518 search results - page 10 / 304
» Cryptographic Test Correction
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
13 years 11 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
DICTA
2007
13 years 8 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
SAS
1999
Springer
117views Formal Methods» more  SAS 1999»
13 years 11 months ago
Abstracting Cryptographic Protocols with Tree Automata
ing Cryptographic Protocols with Tree Automata David Monniaux http://www.di.ens.fr/%7Fmonniaux, Laboratoire d’Informatique, ´Ecole Normale Sup´erieure, 45 rue d’Ulm , 75230 P...
David Monniaux
ESOP
2009
Springer
13 years 11 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi
PTS
1998
131views Hardware» more  PTS 1998»
13 years 8 months ago
Factorized Test Generation for Multi-Input/Output Transition Systems
In this paper we present factorized test generation techniques that can be used to generate test cases from a specification that is modelled as a labelled transition system. The t...
Ed Brinksma, Lex Heerink, Jan Tretmans