Sciweavers

1129 search results - page 162 / 226
» Modular Ranking Abstraction
Sort
View
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
14 years 1 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
ECOOP
2004
Springer
14 years 1 months ago
Object Invariants in Dynamic Contexts
Abstract. Object invariants describe the consistency of object-oriented data structures and are central to reasoning about the correctness of object-oriented software. Yet, reasoni...
K. Rustan M. Leino, Peter Müller
ICCS
2004
Springer
14 years 1 months ago
The Genetic Algorithms Population Pluglet for the H2O Metacomputing System
Abstract. This paper describes GAPP – a framework for the execution of distributed genetic algorithms (GAs) using the H2O metacomputing environment. GAs may be a viable solution ...
Tomasz Ampula, Dawid Kurzyniec, Vaidy S. Sunderam,...
ISOLA
2004
Springer
14 years 1 months ago
Embedding Finite Automata within regular Expressions
Abstract. Regular expressions and their extensions have become a major component of industry-standard specification languages such as PSL/Sugar ([2]). The model checking procedure...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah