A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms
N Mouha, C Celi - Cryptographers' Track at the RSA Conference, 2023 - Springer
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm
3 (SHA-3) that have been released by its designers. The vulnerability has been present …
3 (SHA-3) that have been released by its designers. The vulnerability has been present …
CELI: Controller-Embedded Language Model Interactions
JS Wagner, D DeCaprio, ACM Raja, JM Holman… - arXiv preprint arXiv …, 2024 - arxiv.org
… First, we performed a qualitative analysis of the logs generated during CELI’s problem-solving
process. These logs offered insights into how CELI interpreted problems, generated test …
process. These logs offered insights into how CELI interpreted problems, generated test …
Extending NIST's CAVP testing of cryptographic hash function implementations
N Mouha, C Celi - Cryptographers' Track at the RSA Conference, 2020 - Springer
This paper describes a vulnerability in Apple’s CoreCrypto library, which affects 11 out of
the 12 implemented hash functions: every implemented hash function except MD2 (Message …
the 12 implemented hash functions: every implemented hash function except MD2 (Message …
Avoiding cyberspace catastrophes through smarter testing
A Vassilev, C Celi - Computer, 2014 - ieeexplore.ieee.org
The Heartbleed bug highlighted a critical problem in the software industry: inadequately
tested software results in serious security vulnerabilities. Available testing technologies, …
tested software results in serious security vulnerabilities. Available testing technologies, …
CELI: Simple yet Effective Approach to Enhance Out-of-Domain Generalization of Cross-Encoders.
In text ranking, it is generally believed that the cross-encoders already gather sufficient
token interaction information via the attention mechanism in the hidden layers. However, our …
token interaction information via the attention mechanism in the hidden layers. However, our …
Plague, Performance and the Elusive History of the Stella celi extirpavit
C Macklin - Early Music History, 2010 - cambridge.org
… -century hymn Stella celi extirpavit, a Marian invocation unequivocally phrased as a plea
for deliverance from illness. In this essay, it is proposed that the Stella celi is representative of …
for deliverance from illness. In this essay, it is proposed that the Stella celi is representative of …
[BOOK][B] Randomness mergers: Combining the quantum and classical worlds
CT Celi - 2016 - search.proquest.com
In an ever-evolving digital world, the onset of the Internet of Things leads to a new problem
in secure communications. Embedded devices may lack the computational power to …
in secure communications. Embedded devices may lack the computational power to …
Check for A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms Nicky Mouha¹ () and Christopher Celi²
N Mouha¹, C Celi - Topics in Cryptology–CT-RSA 2023 …, 2023 - books.google.com
This paper describes a vulnerability in several implementations of the Secure Hash Algorithm
3 (SHA-3) that have been released by its designers. The vulnerability has been present …
3 (SHA-3) that have been released by its designers. The vulnerability has been present …
Automation of the NIST Cryptographic Module Validation Program: September 2024 Status Report (Draft)
C Celi, A Calis, M Souppaya, W Barker, K Scarfone… - 2024 - csrc.nist.gov
The Cryptographic Module Validation Program (CMVP) validates third-party assertions that
cryptographic module implementations satisfy the requirements of Federal Information …
cryptographic module implementations satisfy the requirements of Federal Information …
Automation of the Cryptographic Module Validation Program (CMVP)
A Vassilev, C Celi, G O'Brien, M Souppaya, W Barker - 2021 - csrc.nist.gov
The NIST NCCoE is initiating a project to demonstrate the value and practicality of automation
support for the Cryptographic Module Validation Program (CMVP). The outcome of the …
support for the Cryptographic Module Validation Program (CMVP). The outcome of the …