نتایج جستجو برای: symmetric fault

تعداد نتایج: 144562  

2003
Roy Friedman Alon Kama

Replication is one of the prominent approaches for obtaining fault tolerance. Implementing replication on commodity hardware and in a transparent fashion, i.e., without changing the programming model, has many challenges. Deciding at what level to implement the replication has ramifications on development costs and portability of the programs. Other difficulties lie in the coordination of the c...

2008
Arno Wacker

Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symmetric keys between two devices. In this dissertation, we propose three novel decentralized key distribution schemes that guarantee the confidentiality of a key exchange even if an attacker has compromised some of the de...

2017
Anita Aghaie Shanchieh Jay Yang Mehran Mozaffari-Kermani Reza Azarderakhsh

Achieving secure, high performance implementations for constrained applications such as implantable and wearable medical devices is a priority in efficient block ciphers. However, security of these algorithms is not guaranteed in presence of malicious and natural faults. Recently, a new lightweight block cipher, Midori, has been proposed which optimizes the energy consumption besides having low...

2003
Scott L. Nooner Glenn S. Sasagawa Donna K. Blackman Mark A. Zumberge

[1] Using the DSV Alvin, the relative seafloor gravimeter ROVDOG was deployed at 18 sites on the Atlantis Massif (located at the ridge-transform intersection of the MidAtlantic Ridge and the Atlantis Transform Fault near 30 N, 42 W). These data along with previously collected shipboard gravity and bathymetry provide constraints on the density structure of this oceanic core complex. A series of ...

1999
G. Morgan S. K. Shrivastava P. D. Ezhilchelvan

Many fault-tolerant distributed applications can be structured as one or more groups of objects that cooperate by multicasting invocations on member objects. The building of group based applications is considerably simplified if the members of a group can multicast reliably and have a mutually consistent view of the order in which events (such as invocations, host machine failures) have taken p...

1999
Graham Morgan Santosh K. Shrivastava Paul D. Ezhilchelvan Mark C. Little

Many fault-tolerant distributed applications can be structured as one or more groups of objects that cooperate by multicasting invocations on member objects. The building of group based applications is considerably simplified if the members of a group can multicast reliably and have a mutually consistent view of the order in which events (such as invocations, host machine failures) have taken p...

Journal: :IACR Cryptology ePrint Archive 2003
Keith M. Martin Reihaneh Safavi-Naini Huaxiong Wang Peter R. Wild

In threshold cryptography the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and thr...

2004
DARREL S. COWAN MARK T. BRANDON Darrel S. Cowan

We apply a symmetry-based, statistical method for kine­ matic analysis of mesoscale fault-zone structures to resolve the trans­ port directions for the Rosario fault zone and Lopez StructuralCom­ plex in the San Juan Islands. Both moderately dipping fault zones accommodated large amounts of Late Cretaceous slip ( > 30 km), but the transport direction of nappes overlying these fault zones is con...

Journal: :CoRR 2014
James Elliott Mark Hoemmen Frank Mueller

We demonstrate algorithm-based fault tolerance for silent, transient data corruption in “black-box” preconditioners. We consider both additive Schwarz domain decomposition with an ILU(k) subdomain solver, and algebraic multigrid, both implemented in the Trilinos library. We evaluate faults that corrupt preconditioner results in both single and multiple MPI ranks. We then analyze how our approac...

2006
Tal Malkin François-Xavier Standaert Moti Yung

Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید