Sciweavers

1518 search results - page 77 / 304
» Cryptographic Test Correction
Sort
View
112
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 9 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
116
Voted
BMCBI
2007
117views more  BMCBI 2007»
15 years 3 months ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
148
Voted
IACR
2011
125views more  IACR 2011»
14 years 3 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
COMPSEC
2004
131views more  COMPSEC 2004»
15 years 3 months ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
118
Voted
ITC
2003
IEEE
172views Hardware» more  ITC 2003»
15 years 8 months ago
First IC Validation of IEEE Std. 1149.6
–This paper provides proof of concept for the newly-approved 1149.6 standard by investigating the first silicon implementation of the test receiver. EXTEST and EXTEST_PULSE tests...
Suzette Vandivier, Mark Wahl, Jeff Rearick