Sciweavers

5722 search results - page 124 / 1145
» Security Function Interactions
Sort
View
CRYPTO
2006
Springer
88views Cryptology» more  CRYPTO 2006»
14 years 19 days ago
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
Let H1, H2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H1 or H2 is collision resistant. Concatenating the outpu...
Dan Boneh, Xavier Boyen
CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 3 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
DSVIS
2003
Springer
14 years 2 months ago
Applying Extended Finite State Machines in Software Testing of Interactive Systems
Model Based Testing (MBT) is a functional testing technique that makes use of information from behavioral models of the software to carry out the testing task. This technique has b...
Marcelo Fantinato, Mario Jino
RSKT
2009
Springer
14 years 3 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
TIT
2008
106views more  TIT 2008»
13 years 8 months ago
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
This article describes new theoretical results concerning the general behavior of a Feedback with Carry Shift Register (FCSR) automaton. They help to better understand how the init...
François Arnault, Thierry P. Berger, Marine...