Sciweavers

438 search results - page 4 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
EDOC
2011
IEEE
13 years 11 months ago
Towards an Agile Design of the Enterprise Architecture Management Function
Abstract—Enterprise architecture (EA) management provides an engineering approach for the continuous advancement of the enterprise as a whole. The high number of involved compone...
Sabine Buckl, Florian Matthes, Ivan Monahov, Sasch...
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
13 years 11 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
PADO
2001
Springer
15 years 4 months ago
Deriving Pre-conditions for Array Bound Check Elimination
Abstract. We present a high-level approach to array bound check optimization that is neither hampered by recursive functions, nor disabled by the presence of partially redundant ch...
Wei-Ngan Chin, Siau-Cheng Khoo, Dana N. Xu
ICASSP
2011
IEEE
14 years 3 months ago
Empirical divergence maximization for quantizer design: An analysis of approximation error
Empirical divergence maximization is an estimation method similar to empirical risk minimization whereby the Kullback-Leibler divergence is maximized over a class of functions tha...
Michael A. Lexa
EUROCRYPT
2001
Springer
15 years 4 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk