Sciweavers

1518 search results - page 5 / 304
» Cryptographic Test Correction
Sort
View
FC
2009
Springer
118views Cryptology» more  FC 2009»
14 years 1 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
IOLTS
2007
IEEE
98views Hardware» more  IOLTS 2007»
14 years 1 months ago
Robustness of circuits under delay-induced faults : test of AES with the PAFI tool
Security of cryptographic circuits is a major concern. Fault attacks are a mean to obtain critical information with the use of physical disturbance and cryptanalysis. We propose a...
Olivier Faurax, Assia Tria, Laurent Freund, Fr&eac...
AINA
2004
IEEE
13 years 11 months ago
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus
The aim of this work is to describe a tool (Spi2Java) that automatically generates Java code implementing cryptographic protocols described in the formal specification language sp...
Davide Pozza, Riccardo Sisto, Luca Durante
ACSAC
1999
IEEE
13 years 11 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
I3E
2001
196views Business» more  I3E 2001»
13 years 8 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel