Sciweavers

1019 search results - page 47 / 204
» Cryptographic Design Vulnerabilities
Sort
View
105
Voted
SRDS
1997
IEEE
15 years 7 months ago
Comparing Operating Systems Using Robustness Benchmarks
When creating mission-critical distributed systems using off-the-shelf components, it is important to assess the dependability of not only the hardware, but the software as well. ...
Philip J. Koopman Jr., John Sung, Christopher P. D...
121
Voted
USS
2008
15 years 6 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...
122
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Thirty Years Later: Lessons from the Multics Security Evaluation
Almost thirty years ago a vulnerability assessment of Multics identified significant vulnerabilities, despite the fact that Multics was more secure than other contemporary (and cu...
Paul A. Karger, Roger R. Schell
128
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
163
Voted
SETA
2010
Springer
137views Mathematics» more  SETA 2010»
15 years 2 months ago
On a Conjecture about Binary Strings Distribution
It is a difficult challenge to find Boolean functions used in stream ciphers achieving all of the necessary criteria and the research of such functions has taken a significant d...
Jean-Pierre Flori, Hugues Randriam, Gérard ...