Differential

Results: 16357



#Item
1

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    2Cryptography / Power analysis / XMSS / Side-channel attack / DPA / SHA-2 / Post-quantum cryptography

    Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer Juliane Kr¨amer Aymeric Genˆet Denis Butin

    Add to Reading List

    Source URL: kannwischer.eu

    Language: English - Date: 2018-03-15 13:22:57
    3Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / XMSS / HMAC / SHA-2 / Hash function / Crypt / Hash-based cryptography

    Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Full paper available at kannwischer.eu

    Add to Reading List

    Source URL: kannwischer.eu

    Language: English - Date: 2018-04-11 11:26:21
    4

    Do You See What I See? Differential Treatment of Anonymous Users Sheharbano Khattak (University of Cambridge)! David Fifield (UC Berkeley) Sadia Afroz (ICSI)

    Add to Reading List

    Source URL: sheharbano.com

    - Date: 2017-02-16 07:59:03
      5Software testing / Software engineering / Computing / Quality / Fault injection / Software verification / Reliability engineering / Formal verification / Flash memory / Software quality / Stress testing / Exception handling

      Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

      Add to Reading List

      Source URL: rjoshi.org

      Language: English - Date: 2010-09-11 18:31:43
      6Cryptography / Hashing / Post-quantum cryptography / Digital Signature Standard / Cryptographic hash functions / HMAC / XMSS / SHA-2 / Hash function / Hash-based cryptography / Digital Signature Algorithm / BLAKE

      Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer Aymeric Genêt Denis Butin, Juliane Krämer,

      Add to Reading List

      Source URL: kannwischer.eu

      Language: English - Date: 2018-04-11 11:29:02
      7Cryptography / Applied mathematics / Differential cryptanalysis / Data Encryption Standard / Block cipher / Truncated differential cryptanalysis / ICE / Cryptanalysis / Statistical hypothesis testing / Rebound attack / Differential-linear attack

      Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.

      Add to Reading List

      Source URL: who.rocq.inria.fr

      Language: English - Date: 2018-06-14 07:12:36
      8

      Résumé des travaux Claire Debord Liste des publications présentées [1] Claire Debord, Local integration of Lie algebroids. Lie algebroids and related topics in differential geometry (Warsaw, 2000), Banach Center Publ

      Add to Reading List

      Source URL: math.univ-bpclermont.fr

      Language: French - Date: 2018-03-05 11:11:22
        9

        Do You See What I See? Differential Treatment of Anonymous Users Sheharbano Khattak? , David Fifield† , Sadia Afroz† , Mobin Javed† Srikanth Sundaresan‡ , Vern Paxson‡† , Steven J. Murdoch- , Damon McCoy‡ o

        Add to Reading List

        Source URL: sheharbano.com

        Language: English - Date: 2017-02-16 07:58:26
          10Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / Search algorithms / Power analysis / XMSS / Hash function / SHA-2 / DPA / Digital signature / Crypt

          Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

          Add to Reading List

          Source URL: kannwischer.eu

          Language: English - Date: 2018-03-26 10:26:09
          UPDATE