Sciweavers

262 search results - page 50 / 53
» MONA Implementation Secrets
Sort
View
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 11 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
CCS
2008
ACM
13 years 9 months ago
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
Multisignatures allow n signers to produce a short joint signature on a single message. Multisignatures were achieved in the plain model with a non-interactive protocol in groups ...
Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki
CCS
2010
ACM
13 years 7 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...
BMCBI
2008
72views more  BMCBI 2008»
13 years 7 months ago
HECTAR: A method to predict subcellular targeting in heterokonts
Background: The heterokonts are a particularly interesting group of eukaryotic organisms; they include many key species of planktonic and coastal algae and several important patho...
Bernhard Gschloessl, Yann Guermeur, J. Mark Cock
BMCBI
2007
98views more  BMCBI 2007»
13 years 7 months ago
Duration learning for analysis of nanopore ionic current blockades
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties, with potential implications ...
Alexander G. Churbanov, Carl Baribault, Stephen Wi...