Sciweavers

4340 search results - page 81 / 868
» Formal Methods and Cryptography
Sort
View
114
Voted
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 10 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
106
Voted
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 10 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
146
Voted
CAV
2003
Springer
121views Hardware» more  CAV 2003»
15 years 9 months ago
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods
Sanjit A. Seshia, Randal E. Bryant
124
Voted
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
15 years 9 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne
132
Voted
COMPSYSTECH
2010
15 years 3 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev