Sciweavers

1518 search results - page 1 / 304
» Cryptographic Test Correction
Sort
View
IEEESP
2008
67views more  IEEESP 2008»
13 years 5 months ago
Cryptographic Test Correction
Abstract. Multiple choice questionnaires (mcqs) are a widely-used assessment procedure where examinees are asked to select one or more choices from a list. This invited talk1 explo...
Éric Levieil, David Naccache
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 11 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
13 years 9 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
TCS
2002
13 years 5 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
ICASSP
2011
IEEE
12 years 9 months ago
Efficiently computing private recommendations
Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data, which could be misused ...
Zekeriya Erkin, M. Beye, T. Veugen, Reginald L. La...