Sciweavers

66 search results - page 13 / 14
» aes 2008
Sort
View
TCS
2002
13 years 4 months ago
Process algebra for performance evaluation
This paper surveys the theoretical developments in the field of stochastic process algebras, process algebras where action occurrences may be subject to a delay that is determined...
Holger Hermanns, Ulrich Herzog, Joost-Pieter Katoe...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
14 years 5 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
CCS
2008
ACM
13 years 6 months ago
Verifiable functional purity in java
Proving that particular methods within a code base are functionally pure--deterministic and side-effect free--would aid verification of security properties including function inve...
Matthew Finifter, Adrian Mettler, Naveen Sastry, D...
DFT
2008
IEEE
149views VLSI» more  DFT 2008»
13 years 6 months ago
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?
Side-channel attacks are nowadays a serious concern when implementing cryptographic algorithms. Powerful ways for gaining information about the secret key as well as various count...
Francesco Regazzoni, Thomas Eisenbarth, Luca Breve...
SIGECOM
2008
ACM
188views ECommerce» more  SIGECOM 2008»
13 years 4 months ago
Predicting trusts among users of online communities: an epinions case study
Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users ...
Haifeng Liu, Ee-Peng Lim, Hady Wirawan Lauw, Minh-...