Sciweavers

525 search results - page 77 / 105
» The Davies-Murphy Power Attack
Sort
View
ECSQARU
2007
Springer
14 years 4 months ago
Towards an Extensible Argumentation System
Many types of inter-agent dialogue, including information seeking, negotiation and deliberation can be fruitfully seen as varieties of argumentation. Argumentation frameworks, ori...
Adam Zachary Wyner, Trevor J. M. Bench-Capon
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
14 years 3 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne
AFRICACRYPT
2009
Springer
14 years 2 months ago
Exponent Recoding and Regular Exponentiation Algorithms
This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literatur...
Marc Joye, Michael Tunstall
PERCOM
2008
ACM
14 years 9 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 4 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele