Sciweavers

1286 search results - page 166 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
116
Voted
AFRICACRYPT
2010
Springer
15 years 5 months ago
Strong Cryptography from Weak Secrets
the full version of the extended abstract which appears in Africacrypt ’10 (3 – 6 may 2010, Stellenbosch, South Africa) D. Bernstein and T. Lange Eds., Springer-Verlag, LNCS 60...
Xavier Boyen, Céline Chevalier, Georg Fuchs...
94
Voted
CHI
2007
ACM
16 years 1 months ago
Software design and engineering as a social process
Traditionally, software engineering processes are based on a formalist model that emphasizes strict documentation, procedural and validation standards. Although this is a poor fit...
William A. Stubblefield, Tania L. Carson
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
84
Voted
ICALP
2005
Springer
15 years 6 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
125
Voted
ALIFE
2006
15 years 22 days ago
A Comprehensive Overview of the Applications of Artificial Life
We review the applications of artificial life (ALife), the creation of synthetic life on computers to study, simulate, and understand living systems. The definition and features of...
Kyung-Joong Kim, Sung-Bae Cho