Sciweavers

16 search results - page 2 / 4
» On Symmetric Signatures in Holographic Algorithms
Sort
View
EDCC
1999
Springer
13 years 10 months ago
Transparent Word-Oriented Memory BIST Based on Symmetric March Algorithms
Abstract. The paper presents a new approach to transparent BIST for wordoriented RAMs which is based on the transformation of March transparent test algorithms to the symmetric ver...
Vyacheslav N. Yarmolik, I. V. Bykov, Sybille Helle...
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 7 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
CADE
2010
Springer
13 years 7 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...
FPL
2008
Springer
131views Hardware» more  FPL 2008»
13 years 7 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
CCS
2008
ACM
13 years 8 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig