Sciweavers

1898 search results - page 113 / 380
» Weak Keys for IDEA
Sort
View
VLDB
2004
ACM
108views Database» more  VLDB 2004»
14 years 9 months ago
Retrospective on Aurora
This experience paper summarizes the key lessons we learned throughout the design and implementation of the Aurora stream processing engine. For the past two years, we have built f...
Hari Balakrishnan, Magdalena Balazinska, Donald Ca...
ESORICS
2002
Springer
14 years 8 months ago
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
It is believed that masking is an effective countermeasure against power analysis attacks: before a certain operation involving a key is performed in a cryptographic chip, the inpu...
Marcin Gomulkiewicz, Miroslaw Kutylowski
IEEEARES
2008
IEEE
14 years 3 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
14 years 2 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
CL
2000
Springer
14 years 1 months ago
The Taming of the (X)OR
Abstract. Many key verification problems such as boundedmodel-checking,circuit verification and logical cryptanalysis are formalized with combined clausal and affine logic (i.e....
Peter Baumgartner, Fabio Massacci