Sciweavers

814 search results - page 115 / 163
» Analysis of Modular Arithmetic
Sort
View
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
15 years 10 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
OSDI
2008
ACM
15 years 10 months ago
Hunting for Problems with Artemis
Artemis is a modular application designed for analyzing and troubleshooting the performance of large clusters running datacenter services. Artemis is composed of four modules: (1)...
Gabriela F. Cretu-Ciocarlie, Mihai Budiu, Mois&eac...
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
15 years 7 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
IEEEARES
2007
IEEE
15 years 4 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza
SOCO
2007
Springer
15 years 4 months ago
Streamlining Feature-Oriented Designs
Abstract. Software development for embedded systems gains momentum but faces many challenges. Especially the constraints of deeply embedded systems, i.e., extreme resource and perf...
Martin Kuhlemann, Sven Apel, Thomas Leich