A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
2020
Transactions on Cryptographic Hardware and Embedded Systems
In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss possible ways to combine them. ...
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment. ...
At the end of the program, the outputs of the 4 interpretations are merged. ...
doi:10.13154/tches.v2020.i3.454-482
dblp:journals/tches/GoubinRW20
fatcat:pdmjsy2c6jb2xjz7uilipj7oam
Source Attribution of Cryptographic API Misuse in Android Applications
2018
Zenodo
We developed BinSight, a static program analyzer that supports source attribution, and we analyzed 132K Android applications collected in years 2012, 2015, and 2016. ...
Our results suggest that third-party libraries are the main source of cryptographic API misuse. ...
Static program slicing is the computation of a set of program statements, called slices, that may a ect the values of certain variables at a particular program point of interest, referred to as a slicing ...
doi:10.5281/zenodo.3264740
fatcat:th4d55236vevtmgbkasgwchn3u
Revisiting the Principles of NATO Burden-Sharing
2016
Parameters
Similarly, there is little doubt more output could be generated from the 235 billion dollar total sum of European defense expenditure. ...
Measuring defense spending per square kilometer of national territory would constitute an extreme example of this kind. Last, but not least, there is the discussion on common funding. ...
doi:10.55540/0031-1723.2821
fatcat:d5o4k2kefjdifj3otlvwo2w5ce
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later
2016
Computers & security
A cyber forensics needs analysis survey: revisiting the domain's needs a decade later. ...
open-source tools (4) research on encryption, malware, and trail obfuscation; (5) revised laws (specific, up-to-date, and which protect user privacy); (6) better communication, especially between/with ...
https://en.wikipedia.org/wiki/Friedman_test (last accessed 2015-08-10).4 Chi-squared test, p = 0.005.
Chi-squared test, p = 0.025. ...
doi:10.1016/j.cose.2015.10.007
fatcat:ioq2zeub3ff3vfie6n6yg2odga
Tax Expenditure Framework Legislation
2010
Social Science Research Network
As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs. ...
As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs. ...
One consequence of this predilection for tax expenditures is the obfuscation of the size and activities of our government. ...
doi:10.2139/ssrn.1531945
fatcat:6tjlnbt3dzcq5lides5nclcmxm
Tax Expenditure Framework Legislation
2010
National tax journal
As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs. ...
Moreover, the low salience of tax expenditures clouds understanding of the government's allocative interventions among not only the public but also many policymakers. ...
One consequence of this predilection for tax expenditures is the obfuscation of the size and activities of our government. ...
doi:10.17310/ntj.2010.2.09
fatcat:ukjsfpatdnfzfjgcw23yf5yzua
Auto-tabling for subproblem presolving in MiniZinc
2017
Constraints
Despite the possibility of achieving higher solving performance, this tabling reformulation is often not tried, because it is tedious to perform; further, if successful, it obfuscates the original model ...
thereby eliminating both the tedium and the obfuscation. ...
A party is made of four cubes placed in a 2 × 2 square such that the four icons in the centre of the visible side of the square have, for each of the three attributes, either all equal or all different ...
doi:10.1007/s10601-017-9270-5
fatcat:ybvvxytgsbebrjxyv67lo4kwqu
Square Span Programs with Applications to Succinct NIZK Arguments
[chapter]
2014
Lecture Notes in Computer Science
Keywords: Square span program, quadratic span program, SNARKs, non-interactive zero-knowledge arguments of knowledge. ...
We propose a new characterization of NP using square span programs (SSPs). We first characterize NP as affine map constraints on small vectors. ...
The simplifications are twofold: (i) our representation of boolean functions no longer requires wire checkers and (ii) square span programs consist of only a single set of polynomials that are summed and ...
doi:10.1007/978-3-662-45611-8_28
fatcat:cvxyi5wsijdothpw6xnwhokmdi
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
It provides a way to obfuscate the number and list of items a user rated without harming the accuracy of recommendation, and additionally protects recommender's tuning parameters for business benefit and ...
With the data structure, the proposed protocol requires dozens of times less computation cost over those of previous works. ...
To the best of our knowledge there is no known mechanism for privacy-preserving matrix factorization which meets all of previously mentioned requirements. ...
doi:10.1145/2897845.2897875
dblp:conf/ccs/KimKKKYS16
fatcat:7qnupcletvbk7ea3rti3mbc5nu
Library as Infrastructure
2014
Places
knowledge and program our values. ...
They have been expected to symbolize the eminence of a ruler or state, to integrally link “knowledge” and “power” — and, more recently, to serve as “community centers,” “public squares” or “think tanks ...
doi:10.22269/140609
fatcat:hy7xr5lltvha7hlwepfv4uhm5y
CutLHCO: A Consumer-Level Tool for Implementing Generic Collider Data Selection Cuts in the Search for New Physics
[article]
2012
arXiv
pre-print
The structure, function, invocation and usage of the most recent CutLHCO 2.0 program version are documented thoroughly, including a detailed deconstruction of several example card file specifications. ...
A new computer program named CutLHCO is introduced, whose function is the implementation of generic data selection cuts on collider event specification files in the standardized .lhco format. ...
This research was also supported in part by the Sam Houston State University 2011-2012 Enhancement Research Grant program. ...
arXiv:1207.3383v1
fatcat:74rbjhd3x5d6tgg5njtyvysuy4
IMF conditionality and development policy space, 1985–2014
2016
Review of International Political Economy
We revisit two long-standing controversies: Has the policy content of IMF programmes evolved to allow for more policy space? ...
We find little evidence of a fundamental transformation of IMF conditionality. ...
the program' (Leckow 2002) . ...
doi:10.1080/09692290.2016.1174953
fatcat:25ocrzujlrh3ho7f3yantcbyzm
Online Privacy and Aging of Digital Artifacts
2018
Symposium On Usable Privacy and Security
Through a lab study with 30 participants, we probe the concept of aging/decaying of digital artifacts. ...
The decaying of digital artifacts gradually degrades content, thereby becoming less accessible to audiences. ...
Full functionality -positive-sum, not zero-sum 5. End-to-end security -full lifecycle protection 6. Visibility and transparency -keep it open 7. ...
dblp:conf/soups/MohamedC18
fatcat:er3ytezj7jer5la52t4ibbu5hu
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs
2017
IACR Transactions on Symmetric Cryptology
With the same technique we attack 6 (out of 8) rounds of Khazad, the legacy 64-bit blockcipher. ...
Using the new result, we attack 7 (out of 9) rounds of Kuznyechik, the recent Russian blockcipher standard, thus halving its security margin. ...
Acknowledgement The work of Léo Perrin is supported by the CORE project ACRYPT (ID C12-15-4009992) funded by the Fonds National de la Recherche, Luxembourg. ...
doi:10.46586/tosc.v2016.i2.226-247
fatcat:tbe43t6ivnemlfjybb2ukndb2i
Minimizing Side-Channel Attack Vulnerability via Schedule Randomization
2019
2019 IEEE 58th Conference on Decision and Control (CDC)
We then propose an algorithm to construct a set of schedules that achieves a differentation level as high as possible, using the fewest number of schedules, for tasksets with implicit deadlines. ...
Online, the scheduler selects a schedule among a set of available ones, trying to achieve an execution trace that is as different as possible from previous ones, therefore minimizing the amount of information ...
"sum of x < 5" statements. Constraint programming defines the domain in which a solution is located, rather than finding an algorithmic solution to the problem. ...
doi:10.1109/cdc40024.2019.9030144
dblp:conf/cdc/VremanPKFM19
fatcat:xxnwqdn42ncgllzfsfi3t7jixm
« Previous
Showing results 1 — 15 out of 1,485 results