Sciweavers

1518 search results - page 61 / 304
» Cryptographic Test Correction
Sort
View
AFRICACRYPT
2010
Springer
14 years 2 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
PKC
2012
Springer
234views Cryptology» more  PKC 2012»
12 years 1 months ago
Ring-LWE in Polynomial Rings
Abstract. The Ring-LWE problem, introduced by Lyubashevsky, Peikert, and Regev (Eurocrypt 2010), has been steadily finding many uses in numerous cryptographic applications. Still,...
Léo Ducas, Alain Durmus
IACR
2011
104views more  IACR 2011»
12 years 10 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
CIARP
2003
Springer
14 years 4 months ago
Automatic Dark Fibres Detection in Wool Tops
Is proposed a method for the automatic detection of dark fibres in wool tops based on image processing. A software which implements this method was developed, composed by five mo...
J. Bazerque, J. Ciambelli, S. Lafon, S. Randall
USENIX
2008
14 years 1 months ago
Using Causality to Diagnose Configuration Bugs
We present a novel method for diagnosing configuration management errors. Our proposed approach deduces the state of a buggy computer by running predicates that test system correc...
Mona Attariyan, Jason Flinn