Loading...
Search for: improved-scheme
0.004 seconds

    An improved scheme for pre-computed patterns in core-based SoC architecture

    , Article Proceedings of 2016 IEEE East-West Design and Test Symposium, EWDTS 2016, 14 October 2016 through 17 October 2016 ; 2017 ; 9781509006939 (ISBN) Sadredini, E ; Rahimi, R ; Foroutan, P ; Fathy, M ; Navabi, Z ; Sharif University of Technology
    Abstract
    By advances in technology, integrated circuits have come to include more functionality and more complexity in a single chip. Although methods of testing have improved, but the increase in complexity of circuits, keeps testing a challenging problem. Two important challenges in testing of digital circuits are test time and accessing the circuit under test (CUT) for testing. These challenges become even more important in complex system on chip (SoC) zone. This paper presents an improved scheme for generating pre-computed test patterns in core-based systems on chip. This approach reduces the number of pre-computed test patterns and as the result, test application time (TAT) will be decreased.... 

    Enhanced smart-card-based authentication scheme providing forward-secure key agreement

    , Article 1st IFIP International Conference on New Technologies, Mobility and Security, NTMS 2007, Paris, 2 May 2007 through 4 May 2007 ; 2007 , Pages 447-458 ; 9781402062698 (ISBN) Asadpour, M ; Sattarzadeh, B ; Jalili, R ; Sharif University of Technology
    Kluwer Academic Publishers  2007
    Abstract
    Many smart-card-based remote authentication schemes have been proposed recently. In 2004, Yoon et al. presented an improved scheme which is the leading of a research track started from Sun, 2000. In this paper, we illustrate that Yoon et al.'s scheme is vulnerable to the parallel session attack and propose an enhancement of the scheme to resist that attack. In our scheme the parties further establish a forward-secure session key by employing only hash functions to protect the subsequent communications. We also demonstrate that our scheme has better security in comparison to other related works, while it does not incur much computational cost © 2007 Springer  

    Improvement on Q. Xie threshold proxy signature scheme against collusion attack

    , Article 2011 19th Iranian Conference on Electrical Engineering, ICEE 2011, 17 May 2011 through 19 May 2011 ; May , 2011 , Page(s): 1 - 5 ; ISSN : 21647054 ; 9789644634284 (ISBN) Atashgah, M. B ; Bayat, M ; Gardeshi, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In a (t, n) threshold proxy signature scheme, the original signer can delegate the signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer, but t -1 or less of the proxy signers cannot generate a proxy signature. In this paper, we will improve the security of Xie's threshold proxy signature scheme against the new types of collusion attack was presented by Liu and Tan in 2007 We also present that our improved scheme is more efficient than Xie's scheme in terms of computational complexities