Sciweavers

1518 search results - page 15 / 304
» Cryptographic Test Correction
Sort
View
AH
2008
Springer
14 years 2 months ago
Guaranteeing the Correctness of an Adaptive Tutoring System
Abstract. This paper presents an approach to create adaptive web-based educative systems that can be automatically audited by means of standard web testing tools. The auditing tool...
Pilar Prieto Linillos, Sergio Gutiérrez San...
ICICS
2007
Springer
14 years 2 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak
CSFW
2007
IEEE
14 years 2 months ago
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata
We study simulation relations for Probabilistic Automata that require transitions to be matched up to negligible sets provided that computation lengths are polynomially bounded. T...
Roberto Segala, Andrea Turrini
ISW
2001
Springer
14 years 29 days ago
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator B
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic transformations in reconfigurable hardware. Full imp...
Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Sc...
CCS
2011
ACM
12 years 8 months ago
Trace equivalence decision: negative tests and non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...