Sciweavers

1518 search results - page 62 / 304
» Cryptographic Test Correction
Sort
View
103
Voted
TREC
2001
15 years 1 months ago
Machine Learning Approach for Homepage Finding Task
This paper describes new machine learning approaches to predict the correct homepage in response to a user's homepage finding query. This involves two phases. In the first ph...
Wensi Xi, Edward A. Fox
78
Voted
SP
2009
IEEE
15 years 7 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
100
Voted
CONCUR
2005
Springer
15 years 6 months ago
Selecting Theories and Recursive Protocols
Many decidability results are known for non-recursive cryptographic protocols, where the protocol steps can be expressed by simple rewriting rules. Recently, a tree transducer-base...
Tomasz Truderung
DAC
2007
ACM
15 years 4 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
159
Voted
FPGA
2004
ACM
234views FPGA» more  FPGA 2004»
15 years 4 months ago
An embedded true random number generator for FPGAs
Field Programmable Gate Arrays (FPGAs) are an increasingly popular choice of platform for the implementation of cryptographic systems. Until recently, designers using FPGAs had le...
Paul Kohlbrenner, Kris Gaj