Sciweavers

1518 search results - page 31 / 304
» Cryptographic Test Correction
Sort
View
FOSAD
2009
Springer
14 years 5 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
USS
2008
14 years 1 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
CORR
2010
Springer
211views Education» more  CORR 2010»
13 years 11 months ago
Studying the Feasibility and Importance of Software Testing: An Analysis
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of tes...
S. S. Riaz Ahamed
PLDI
1996
ACM
14 years 3 months ago
Target-Sensitive Construction of Diagnostic Programs for Procedure Calling Sequence Generators
Building compilers that generate correct code is difficult. In this paper we present a compiler testing technique that closes the gap between actual compiler implementations and c...
Mark W. Bailey, Jack W. Davidson
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 11 months ago
Weak Verifiable Random Functions
Verifiable random functions (VRFs), introduced by Micali, Rabin and Vadhan, are pseudorandom functions in which the owner of the seed produces a public-key that constitutes a commi...
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum...