Sciweavers

222 search results - page 26 / 45
» How to Forget a Secret
Sort
View
AGILEDC
2007
IEEE
15 years 4 months ago
Consciously Evolving an Agile Team
By now it is common knowledge that it’s just as easy for a team to fail using agile practices as it is with waterfall or any other method for building software. So what is the s...
Aaron Ruhnow
CCS
2007
ACM
15 years 4 months ago
An information-theoretic model for adaptive side-channel attacks
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. This allows us to expr...
Boris Köpf, David A. Basin
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
15 years 3 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel