Sciweavers

1518 search results - page 13 / 304
» Cryptographic Test Correction
Sort
View
89
Voted
CCS
2008
ACM
15 years 2 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
IFIP
2009
Springer
15 years 7 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
FROCOS
2005
Springer
15 years 6 months ago
Logical Analysis of Hash Functions
Abstract. In this paper we report on a novel approach for uniform encoding of hash functions (but also other cryptographic functions) into propositional logic formulae, and reducin...
Dejan Jovanovic, Predrag Janicic
82
Voted
CHES
2005
Springer
87views Cryptology» more  CHES 2005»
15 years 6 months ago
Templates as Master Keys
We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even sin...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Ka...
81
Voted
ACSD
2001
IEEE
118views Hardware» more  ACSD 2001»
15 years 4 months ago
Correct Performance of Transaction Capabilities
The correctness of an optimisation of the Transport Capabilities Application Part of the Signalling System No. 7 is formalised as a branching bisimulation which is relaxed to allo...
Thomas Arts, Izak van Langevelde