Sciweavers

2767 search results - page 41 / 554
» Universal Exponentiation Algorithm
Sort
View
CCS
2006
ACM
14 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
WDAG
2000
Springer
81views Algorithms» more  WDAG 2000»
14 years 1 months ago
On the Importance of Having an Identity or is Consensus Really Universal?
We show that Naming
Harry Buhrman, Alessandro Panconesi, Riccardo Silv...
SODA
2004
ACM
173views Algorithms» more  SODA 2004»
13 years 11 months ago
Tabulation based 4-universal hashing with applications to second moment estimation
We show that 4-universal hashing can be implemented efficiently using tabulated 4-universal hashing for characters, gaining a factor of 5 in speed over the fastest existing method...
Mikkel Thorup, Yin Zhang
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
14 years 1 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
STOC
2010
ACM
171views Algorithms» more  STOC 2010»
14 years 2 months ago
An Optimal Ancestry Scheme and Small Universal Posets
Pierre Fraigniaud and Amos Korman