Sciweavers

1019 search results - page 50 / 204
» Cryptographic Design Vulnerabilities
Sort
View
IAT
2008
IEEE
15 years 10 months ago
An Analysis of Entries in the First TAC Market Design Competition
This paper presents an analysis of entries in the first TAC Market Design Competition that compares the entries across several scenarios. The analysis complements previous work a...
Jinzhong Niu, Kai Cai, Peter McBurney, Simon Parso...
ICICS
2005
Springer
15 years 9 months ago
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol
We design and analyze a simple optimistic fair non-repudiation protocol. Our protocol is considerably simpler and more efficient than current proposals, due mainly to the avoidanc...
J. G. Cederquist, Ricardo Corin, Muhammad Torabi D...
AES
2004
Springer
151views Cryptology» more  AES 2004»
15 years 9 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
IJNSEC
2008
103views more  IJNSEC 2008»
15 years 3 months ago
On Cipher Design Based on Switchable Controlled Operations
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the desi...
Nikolay A. Moldovyan
HICSS
2008
IEEE
163views Biometrics» more  HICSS 2008»
15 years 10 months ago
Building a Test Suite for Web Application Scanners
This paper describes the design of a test suite for thorough evaluation of web application scanners. Web application scanners are automated, black-box testing tools that examine w...
Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E...