Sciweavers

343 search results - page 51 / 69
» Formal security analysis of PKCS
Sort
View
EUROCRYPT
2009
Springer
16 years 10 days ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 12 months ago
Automatic analysis of distance bounding protocols
Distance bounding protocols are used by nodes in wireless networks for the crucial purpose of estimating their distances to other nodes. Past efforts to analyze these protocols hav...
Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore ...
99
Voted
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
KBSE
2006
IEEE
15 years 5 months ago
Effective Generation of Interface Robustness Properties for Static Analysis
A software system interacts with its environment through system interfaces. Robustness of software systems are governed by various temporal properties related to these interfaces,...
Mithun Acharya, Tanu Sharma, Jun Xu, Tao Xie
CORR
2011
Springer
187views Education» more  CORR 2011»
14 years 6 months ago
Failure of A Mix Network
A mix network by Wikstrom fails in correctness, provable privacy and soundness. Its claimed advantages in security and efficiency are compromised. The analysis in this paper illus...
Kun Peng