نتایج جستجو برای: malleability

تعداد نتایج: 986  

Journal: :Applied sciences 2022

Maintaining a high rate of productivity, in terms completed jobs per unit time, High-Performance Computing (HPC) facilities is cornerstone the next generation exascale supercomputers. Process malleability presented as straightforward mechanism to address that issue. Nowadays, vast majority HPC are intended for distributed-memory applications based on Message Passing (MP) paradigm. For this reas...

2014
Christian Decker Roger Wattenhofer

In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the origina...

2006
Kaoutar El Maghraoui Travis J. Desell Boleslaw K. Szymanski Carlos A. Varela

Malleability enables a parallel application’s execution system to split or merge processes modifying the parallel application’s granularity. While process migration is widely used to adapt applications to dynamic execution environments, it is limited by the granularity of the application’s processes. Malleability empowers process migration by allowing the application’s processes to expand or sh...

Journal: :Journal of the Franklin Institute 1925

2015
Marcin Andrychowicz Stefan Dziembowski Daniel Malinowski Lukasz Mazurek

We study the problem of malleability of Bitcoin transactions. Our first two contributions can be summarized as follows: (i) we perform practical experiments on Bitcoin that show that it is very easy to maul Bitcoin transactions with high probability, and (ii) we analyze the behavior of the popular Bitcoin wallets in the situation when their transactions are mauled; we conclude that most of them...

Journal: :Trends in Cognitive Sciences 2016

Journal: :Social Science Research Network 2021

2015
Zhengan Huang Shengli Liu Xianping Mao Kefei Chen

We formalize the security notions of non-malleability under selective opening attacks (NM-SO security) in two approaches: the indistinguishability-based approach and the simulationbased approach. We explore the relations between NM-SO security notions and the known selective opening security notions, and the relations between NM-SO security notions and the standard non-malleability notions.

2015
Sebastian Buchwald Manuel Mohr Andreas Zwinkau

Invasive Computing enables a resource-aware programming style, which includes adapting to external resource changes similar to malleability. We introduce asynchronously-malleable applications, which can adapt at any time without synchronizing the whole application, in contrast to specific synchronization points. We show how master-slave applications meet the requirements for asynchronous mallea...

2008
Marc Fischlin

We give an alternative security proof for NMAC and HMAC when deployed as a message authentication code, supplementing the previous result by Bellare (Crypto 2006). We show that (black-box) non-malleability and unpredictability of the compression function suffice in this case, yielding security under different assumptions. This also suggests that some sort of non-malleability is a desirable desi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید