Sciweavers

814 search results - page 30 / 163
» Analysis of Modular Arithmetic
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
15 years 3 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
BMCBI
2010
139views more  BMCBI 2010»
15 years 2 months ago
MOTIPS: Automated Motif Analysis for Predicting Targets of Modular Protein Domains
Background: Many protein interactions, especially those involved in signaling, involve short linear motifs consisting of 5-10 amino acid residues that interact with modular protei...
Hugo Y. K. Lam, Philip M. Kim, Janine Mok, Raffi T...
ASIACRYPT
2008
Springer
15 years 3 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
VMCAI
2009
Springer
15 years 8 months ago
Thread-Modular Shape Analysis
We present the first shape analysis for multithreaded programs that avoids the explicit enumeration of execution-interleavings. Our approach is to automatically infer a resource ...
Alexey Gotsman, Josh Berdine, Byron Cook, Mooly Sa...
TSE
1998
115views more  TSE 1998»
15 years 1 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon