Sciweavers

2303 search results - page 38 / 461
» The Cryptographic Abstract Machine
Sort
View
132
Voted
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 7 days ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ECML
2005
Springer
15 years 8 months ago
On the LearnAbility of Abstraction Theories from Observations for Relational Learning
Stefano Ferilli, Teresa Maria Altomare Basile, Nic...
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
15 years 6 months ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
FSTTCS
2010
Springer
15 years 15 days ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
APLAS
2007
ACM
15 years 6 months ago
A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
: An Extended Abstract Alwen Tiu Computer Sciences Laboratory Australian National University Abstract. A notion of open bisimulation is formulated for the spi calculus, an extensio...
Alwen Tiu