Sciweavers

BIRTHDAY
2016
Springer
8 years 8 months ago
Abstract Interpretation of PEPA Models
Stephen Gilmore, Jane Hillston, Natalia Zon
BIRTHDAY
2016
Springer
8 years 8 months ago
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
Companies as well as individual users are adopting cloud solutions at an over-increasing rate for storing data and making them accessible to others. While migrating data to the clo...
Sabrina De Capitani di Vimercati, Sara Foresti, Gi...
BIRTHDAY
2016
Springer
8 years 8 months ago
Dual EC: A Standardized Back Door
Abstract. Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generat...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
BIRTHDAY
2016
Springer
8 years 8 months ago
Double-Speed Barrett Moduli
Modular multiplication and modular reduction are the atomic constituents of most public-key cryptosystems. Amongst the numerous algorithms for performing these operations, a partic...
Rémi Géraud, Diana Maimut, David Nac...
BIRTHDAY
2016
Springer
8 years 8 months ago
An Improved Differential Attack on Full GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-25...
Nicolas T. Courtois
BIRTHDAY
2016
Springer
8 years 8 months ago
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
We describe a novel approach to reduce the impact of spoofing by a subtle change in the login process. At the heart of our contribution is the understanding that current anti-spo...
Markus Jakobsson, Hossein Siadati
BIRTHDAY
2016
Springer
8 years 8 months ago
Moessner's Theorem: An Exercise in Coinductive Reasoning in Coq
Moessner’s Theorem describes a construction of the sequence of powers (1n , 2n , 3n , . . . ), by repeatedly dropping and summing elements from the sequence of positive natural n...
Robbert Krebbers, Louis Parlant, Alexandra Silva
BIRTHDAY
2016
Springer
8 years 8 months ago
Guards, Failure, and Partiality: Dijkstra's Guarded-Command Language Formulated Topologically
Existing treatments of Dijkstra’s guarded-command language treat divergence and failure as equivalent, even though Dijkstra clearly states they are not. We reexamine Dijkstra’s...
David A. Schmidt
BIRTHDAY
2016
Springer
8 years 8 months ago
Safe-Errors on SPA Protected Implementations with the Atomicity Technique
ecdsa is one of the most important public-key signature scheme, however it is vulnerable to lattice attack once a few bits of the nonces are leaked. To protect Elliptic Curve Crypt...
Pierre-Alain Fouque, Sylvain Guilley, Cédri...
BIRTHDAY
2016
Springer
8 years 8 months ago
A Small-Step Semantics of a Concurrent Calculus with Goroutines and Deferred Functions
In this paper, we present a small-step operational semantics for a small concurrent language supporting deferred function calls and related constructs in the style of the Go progra...
Martin Steffen