Sciweavers

222 search results - page 26 / 45
» How to Forget a Secret
Sort
View
AGILEDC
2007
IEEE
15 years 10 months ago
Consciously Evolving an Agile Team
By now it is common knowledge that it’s just as easy for a team to fail using agile practices as it is with waterfall or any other method for building software. So what is the s...
Aaron Ruhnow
CCS
2007
ACM
15 years 10 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
15 years 9 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
115
Voted
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 9 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel