Sciweavers

634 search results - page 17 / 127
» Groundwork for Weak Analysis
Sort
View
INDOCRYPT
2007
Springer
14 years 3 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
QEST
2005
IEEE
14 years 3 months ago
Comparative Analysis of Bisimulation Relations on Alternating and Non-Alternating Probabilistic Models
We consider bisimulation and weak bisimulation relations in the context of the Labeled Markov Chains of Hansson and Jonsson, the Concurrent Labeled Markov Chains of Philippou, Lee...
Roberto Segala, Andrea Turrini
METRICS
2002
IEEE
14 years 2 months ago
Testability Analysis of a UML Class Diagram
Design-for-testability is a very important issue in software engineering. It becomes crucial in the case of OO designs where control flows are generally not hierarchical, but are d...
Benoit Baudry, Yves Le Traon, Gerson Sunyé
ISICT
2003
13 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
JOC
2011
94views more  JOC 2011»
13 years 19 days ago
Mutual Information Analysis: a Comprehensive Study
Mutual Information Analysis is a generic side-channel distinguisher that has been introduced at CHES 2008. It aims to allow successful attacks requiring minimum assumptions and kno...
Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff,...