Sciweavers

2303 search results - page 38 / 461
» The Cryptographic Abstract Machine
Sort
View
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 2 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
113
Voted
ECML
2005
Springer
15 years 10 months ago
On the LearnAbility of Abstraction Theories from Observations for Relational Learning
Stefano Ferilli, Teresa Maria Altomare Basile, Nic...
CHES
1999
Springer
99views Cryptology» more  CHES 1999»
15 years 9 months ago
Probing Attacks on Tamper-Resistant Devices
Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibl...
Helena Handschuh, Pascal Paillier, Jacques Stern
176
Voted
FSTTCS
2010
Springer
15 years 3 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
159
Voted
APLAS
2007
ACM
15 years 9 months ago
A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
: An Extended Abstract Alwen Tiu Computer Sciences Laboratory Australian National University Abstract. A notion of open bisimulation is formulated for the spi calculus, an extensio...
Alwen Tiu