Sciweavers

4340 search results - page 35 / 868
» Formal Methods and Cryptography
Sort
View
FMSD
2011
236views Formal Methods» more  FMSD 2011»
14 years 3 months ago
Automatic analysis of DMA races using model checking and k-induction
Alastair F. Donaldson, Daniel Kroening, Philipp R&...
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 5 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
QUANTUMCOMM
2009
Springer
15 years 6 months ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo
ASAP
2000
IEEE
141views Hardware» more  ASAP 2000»
15 years 4 months ago
Bit Permutation Instructions for Accelerating Software Cryptography
Permutation is widely used in cryptographic algorithms. However, it is not well-supported in existing instruction sets. In this paper, two instructions, PPERM3R and GRP, are propo...
Zhijie Shi, Ruby B. Lee
NIPS
2004
15 years 1 months ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...