Sciweavers

1518 search results - page 62 / 304
» Cryptographic Test Correction
Sort
View
TREC
2001
14 years 11 days ago
Machine Learning Approach for Homepage Finding Task
This paper describes new machine learning approaches to predict the correct homepage in response to a user's homepage finding query. This involves two phases. In the first ph...
Wensi Xi, Edward A. Fox
SP
2009
IEEE
14 years 5 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
CONCUR
2005
Springer
14 years 4 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
DAC
2007
ACM
14 years 2 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
14 years 2 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj