Sciweavers

3238 search results - page 25 / 648
» Not Enough Points Is Enough
Sort
View
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
14 years 1 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen
XPU
2007
Springer
14 years 1 months ago
Usability in Agile Software Development: Extending the Interaction Design Process with Personas Approach
The current agile software development methods do not seem to address usability and interaction design issues enough, i.e., the interaction design process may remain implicit. Howe...
Jukka Haikara
VMCAI
2005
Springer
14 years 1 months ago
An Overview of Semantics for the Validation of Numerical Programs
Interval computations, stochastic arithmetic, automatic differentiation, etc.: much work is currently done to estimate and to improve the numerical accuracy of programs but few c...
Matthieu Martel
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
13 years 12 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
DATE
1998
IEEE
88views Hardware» more  DATE 1998»
13 years 12 months ago
Functional Scan Chain Testing
Functional scan chains are scan chains that have scan paths through a circuit's functional logic and flip-flops. Establishing functional scan paths by test point insertion (T...
Douglas Chang, Kwang-Ting Cheng, Malgorzata Marek-...