Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Victor Dyseryn"'
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 255, Iss Proc. EXPRESS/SOS 2017, Pp 18-34 (2017)
In contrast to common belief, the Calculus of Communicating Systems (CCS) and similar process algebras lack the expressive power to accurately capture mutual exclusion protocols without enriching the language with fairness assumptions. Adding a fairn
Externí odkaz:
https://doaj.org/article/493e819474ce4368bb44caac0b3edc06
Publikováno v:
Journal of Cryptographic Engineering. 11:135-146
Cache-timing attacks are serious security threats that exploit cache memories to steal secret information. We believe that the identification of a sequence of function calls from cache-timing data measurements is not a trivial step when building an a
Publikováno v:
Post-Quantum Cryptography ISBN: 9783031172335
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7141708169eb5615cbde1510dae4e6c2
https://doi.org/10.1007/978-3-031-17234-2_3
https://doi.org/10.1007/978-3-031-17234-2_3
Publikováno v:
ISIT
Among the candidates for NIST's post-quantum cryptography standardization project, cryptosystems that rely on Low Rank Parity Check (LRPC) codes have interesting properties, such as a low public key size. However, the key generation phase for these c
Autor:
Kazuihde Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon
Publikováno v:
ARES
Supply chain management is critical in industrial efforts to reduce costs and time, stabilize product supply, and improve profitability. Surveillance cameras play a significant role in supply chain management, as they can record work activities to ac
Publikováno v:
EXPRESS/SOS
Electronic Proceedings in Theoretical Computer Science, Vol 255, Iss Proc. EXPRESS/SOS 2017, Pp 18-34 (2017)
Electronic Proceedings in Theoretical Computer Science, Vol 255, Iss Proc. EXPRESS/SOS 2017, Pp 18-34 (2017)
In contrast to common belief, the Calculus of Communicating Systems (CCS) and similar process algebras lack the expressive power to accurately capture mutual exclusion protocols without enriching the language with fairness assumptions. Adding a fairn
Publikováno v:
PROOFS
Cache timing attacks are serious security threats that exploit cache memories to steal secret information.We believe that the identification of a sequence of operations from a set of cache-timing data measurements is not a trivial step when building