Sciweavers

1518 search results - page 10 / 304
» Cryptographic Test Correction
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 4 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
125
Voted
DICTA
2007
15 years 1 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
95
Voted
SAS
1999
Springer
117views Formal Methods» more  SAS 1999»
15 years 4 months ago
Abstracting Cryptographic Protocols with Tree Automata
ing Cryptographic Protocols with Tree Automata David Monniaux http://www.di.ens.fr/%7Fmonniaux, Laboratoire d’Informatique, ´Ecole Normale Sup´erieure, 45 rue d’Ulm , 75230 P...
David Monniaux
111
Voted
ESOP
2009
Springer
15 years 4 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi
126
Voted
PTS
1998
131views Hardware» more  PTS 1998»
15 years 1 months ago
Factorized Test Generation for Multi-Input/Output Transition Systems
In this paper we present factorized test generation techniques that can be used to generate test cases from a specification that is modelled as a labelled transition system. The t...
Ed Brinksma, Lex Heerink, Jan Tretmans