Sciweavers

17 search results - page 3 / 4
» Differential Fault Analysis of Trivium
Sort
View
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
13 years 9 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
ICARIS
2003
Springer
13 years 11 months ago
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems
Supermarkets lose millions of pounds every year through lost trading and stock wastage caused by the failure of refrigerated cabinets. Therefore, a huge commercial market exists fo...
Dan W. Taylor, David Corne
ICST
2010
IEEE
13 years 4 months ago
Automated Behavioral Regression Testing
—When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made ...
Wei Jin, Alessandro Orso, Tao Xie
BROADNETS
2004
IEEE
13 years 9 months ago
Fault Management with Fast Restoration for Optical Burst Switched Networks
This paper studies the important fault management issue with focus on the fast restoration mechanisms for Optical Burst Switched (OBS) networks. In order to reduce the burst losse...
Yufeng Xin, Jing Teng, Gigi Karmous-Edwards, Georg...
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
13 years 9 months ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...