Sciweavers

1834 search results - page 92 / 367
» Public Key Cryptography
Sort
View
PKC
2005
Springer
102views Cryptology» more  PKC 2005»
15 years 4 months ago
Experimenting with Faults, Lattices and the DSA
We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be the first (publicly reported) physical experimen...
David Naccache, Phong Q. Nguyen, Michael Tunstall,...
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 4 months ago
Key Features of the UCSC Genome Site
The UCSC Genome site has been contributing to the public genomics community for over 5 years. We wish to highlight the key features, both new and old.
Heather Trumbower, Jennifer Jackson
CSJM
2008
126views more  CSJM 2008»
14 years 11 months ago
Private Key Extension of Polly Cracker Cryptosystems
In 1993 Koblitz and Fellows proposed a public key cryptosystem, Polly Cracker, based on the problem of solving multivariate systems of polynomial equations, which was soon general...
Nina Taslaman
NIPS
2004
15 years 18 days ago
Synchronization of neural networks by mutual learning and its application to cryptography
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
IJSN
2006
123views more  IJSN 2006»
14 years 11 months ago
A survey of key evolving cryptosystems
: This paper presents a survey of key evolving cryptosystems in the public key setting, focusing on two main approaches: `forward security' and `intrusion resilience'. Th...
Matthew K. Franklin