Sciweavers

CHES
2011
Springer
250views Cryptology» more  CHES 2011»
14 years 3 months ago
High-Speed High-Security Signatures
Daniel J. Bernstein, Niels Duif, Tanja Lange, Pete...
142
Voted
CHES
2011
Springer
271views Cryptology» more  CHES 2011»
14 years 3 months ago
Modulus Fault Attacks against RSA-CRT Signatures
RSA-CRT fault attacks have been an active research area since their discovery by Boneh, DeMillo and Lipton in 1997. We present alternative key-recovery attacks on RSA-CRT signature...
Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi...
CHES
2011
Springer
240views Cryptology» more  CHES 2011»
14 years 3 months ago
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
A lightweight and secure key storage scheme using silicon Physical Unclonable Functions (PUFs) is described. To derive stable PUF bits from chip manufacturing variations, a lightwe...
Meng-Day (Mandel) Yu, David M'Raïhi, Richard ...
165
Voted
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
14 years 3 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
CF
2011
ACM
14 years 3 months ago
Hybrid high-performance low-power and ultra-low energy reliable caches
Ubiquitous computing has become a very popular paradigm. The most suitable technological solution for those systems consists of using hybrid processors able to operate at high vol...
Bojan Maric, Jaume Abella, Francisco J. Cazorla, M...
213
Voted
CF
2011
ACM
14 years 3 months ago
SIFT: a low-overhead dynamic information flow tracking architecture for SMT processors
Dynamic Information Flow Tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of vulnerabilities such as buffer overflow and code inj...
Meltem Ozsoy, Dmitry Ponomarev, Nael B. Abu-Ghazal...
CEJCS
2011
78views more  CEJCS 2011»
14 years 3 months ago
Good versus optimal: Why network analytic methods need more systematic evaluation
: Network analytic method designed for the analysis of static networks promise to identify significant relational patterns that correlate with important structures in the complex ...
Katharina Anna Zweig
CEJCS
2011
80views more  CEJCS 2011»
14 years 3 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
166
Voted
CEC
2011
IEEE
14 years 3 months ago
Differential evolution with multiple strategies for solving CEC2011 real-world numerical optimization problems
—Over the last two decades, many Differential Evolution (DE) strategies have been introduced for solving Optimization Problems. Due to the variability of the characteristics in o...
Saber M. Elsayed, Ruhul A. Sarker, Daryl Essam