Sciweavers

978 search results - page 73 / 196
» Knowledge, Probability, and Adversaries
Sort
View
CHES
2005
Springer
87views Cryptology» more  CHES 2005»
15 years 3 months ago
Templates as Master Keys
We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even sin...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Ka...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
ESOP
2005
Springer
15 years 3 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
WDAG
2005
Springer
74views Algorithms» more  WDAG 2005»
15 years 3 months ago
On the Availability of Non-strict Quorum Systems
Abstract. Allowing read operations to return stale data with low probability has been proposed as a means to increase availability in quorums systems. Existing solutions that allow...
Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi
ESA
2004
Springer
96views Algorithms» more  ESA 2004»
15 years 3 months ago
An Experimental Study of Random Knapsack Problems
The size of the Pareto curve for the bicriteria version of the knapsack problem is polynomial on average. This has been shown for various random input distributions. We experimenta...
René Beier, Berthold Vöcking