Sciweavers

1518 search results - page 77 / 304
» Cryptographic Test Correction
Sort
View
84
Voted
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
15 years 6 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
88
Voted
BMCBI
2007
117views more  BMCBI 2007»
15 years 22 days ago
DNA-based watermarks using the DNA-Crypt algorithm
Background: The aim of this paper is to demonstrate the application of watermarks based on DNA sequences to identify the unauthorized use of genetically modified organisms (GMOs) ...
Dominik Heider, Angelika Barnekow
IACR
2011
125views more  IACR 2011»
14 years 7 days ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
COMPSEC
2004
131views more  COMPSEC 2004»
15 years 13 days ago
Biometric random number generators
Abstract Up to now biometric methods have been used in cryptography for authentication purposes. In this paper we propose to use biological data for generating sequences of random ...
Janusz Szczepanski, Elek Wajnryb, José M. A...
102
Voted
ITC
2003
IEEE
172views Hardware» more  ITC 2003»
15 years 5 months ago
First IC Validation of IEEE Std. 1149.6
–This paper provides proof of concept for the newly-approved 1149.6 standard by investigating the first silicon implementation of the test receiver. EXTEST and EXTEST_PULSE tests...
Suzette Vandivier, Mark Wahl, Jeff Rearick