A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms

N Mouha, C Celi - Cryptographers' Track at the RSA Conference, 2023 - Springer
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm
3 (SHA-3) that have been released by its designers. The vulnerability has been present …

CELI: Controller-Embedded Language Model Interactions

JS Wagner, D DeCaprio, ACM Raja, JM Holman… - arXiv preprint arXiv …, 2024 - arxiv.org
… First, we performed a qualitative analysis of the logs generated during CELI’s problem-solving
process. These logs offered insights into how CELI interpreted problems, generated test …

Extending NIST's CAVP testing of cryptographic hash function implementations

N Mouha, C Celi - Cryptographers' Track at the RSA Conference, 2020 - Springer
This paper describes a vulnerability in Apple’s CoreCrypto library, which affects 11 out of
the 12 implemented hash functions: every implemented hash function except MD2 (Message …

Avoiding cyberspace catastrophes through smarter testing

A Vassilev, C Celi - Computer, 2014 - ieeexplore.ieee.org
The Heartbleed bug highlighted a critical problem in the software industry: inadequately
tested software results in serious security vulnerabilities. Available testing technologies, …

CELI: Simple yet Effective Approach to Enhance Out-of-Domain Generalization of Cross-Encoders.

C Zhang, M Li, J Lin - Proceedings of the 2024 Conference of the …, 2024 - aclanthology.org
In text ranking, it is generally believed that the cross-encoders already gather sufficient
token interaction information via the attention mechanism in the hidden layers. However, our …

Plague, Performance and the Elusive History of the Stella celi extirpavit

C Macklin - Early Music History, 2010 - cambridge.org
… -century hymn Stella celi extirpavit, a Marian invocation unequivocally phrased as a plea
for deliverance from illness. In this essay, it is proposed that the Stella celi is representative of …

[BOOK][B] Randomness mergers: Combining the quantum and classical worlds

CT Celi - 2016 - search.proquest.com
In an ever-evolving digital world, the onset of the Internet of Things leads to a new problem
in secure communications. Embedded devices may lack the computational power to …

Check for A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Nicky Mouha¹ () and Christopher Celi²

N Mouha¹, C Celi - Topics in Cryptology–CT-RSA 2023 …, 2023 - books.google.com
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm
3 (SHA-3) that have been released by its designers. The vulnerability has been present …

Automation of the NIST Cryptographic Module Validation Program: September 2024 Status Report (Draft)

C Celi, A Calis, M Souppaya, W Barker, K Scarfone… - 2024 - csrc.nist.gov
The Cryptographic Module Validation Program (CMVP) validates third-party assertions that
cryptographic module implementations satisfy the requirements of Federal Information …

Automation of the Cryptographic Module Validation Program (CMVP)

A Vassilev, C Celi, G O'Brien, M Souppaya, W Barker - 2021 - csrc.nist.gov
The NIST NCCoE is initiating a project to demonstrate the value and practicality of automation
support for the Cryptographic Module Validation Program (CMVP). The outcome of the …