Sciweavers

814 search results - page 30 / 163
» Analysis of Modular Arithmetic
Sort
View
CHES
2008
Springer
144views Cryptology» more  CHES 2008»
14 years 12 months ago
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs
Abstract. This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate...
Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Ak...
BMCBI
2010
139views more  BMCBI 2010»
14 years 10 months ago
MOTIPS: Automated Motif Analysis for Predicting Targets of Modular Protein Domains
Background: Many protein interactions, especially those involved in signaling, involve short linear motifs consisting of 5-10 amino acid residues that interact with modular protei...
Hugo Y. K. Lam, Philip M. Kim, Janine Mok, Raffi T...
ASIACRYPT
2008
Springer
14 years 12 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
VMCAI
2009
Springer
15 years 4 months ago
Thread-Modular Shape Analysis
We present the first shape analysis for multithreaded programs that avoids the explicit enumeration of execution-interleavings. Our approach is to automatically infer a resource ...
Alexey Gotsman, Josh Berdine, Byron Cook, Mooly Sa...
TSE
1998
115views more  TSE 1998»
14 years 9 months ago
Integration and Analysis of Use Cases Using Modular Petri Nets in Requirements Engineering
—It is well known that requirements engineering plays a critical role in software quality. The use case approach is a requirements elicitation technique commonly used in industri...
Woo Jin Lee, Sung Deok Cha, Yong Rae Kwon