Sciweavers

362 search results - page 11 / 73
» Abstraction in Cryptography
Sort
View
ASM
2004
ASM
14 years 26 days ago
The Cryptographic Abstract Machine
tographic Abstract Machine Dean Rosenzweig and Davor Runje University of Zagreb The Cryptographic Abstract Machine is an executional model of cryptographic actions, independent of ...
Dean Rosenzweig, Davor Runje
FOCS
2009
IEEE
14 years 2 months ago
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Abstract— We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is...
Yael Tauman Kalai, Xin Li, Anup Rao
ESORICS
2009
Springer
14 years 2 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
VTC
2008
IEEE
14 years 1 months ago
Secure Vehicular Communication for Safety Applications - A Measurement Study
Abstract—In this paper, we explore the feasibility of vehicleto-vehicle (V2V) secure communication using public key cryptography. We implement a prototype and test it extensively...
Juhong Min, Jihun Ha, Sangki Yun, Inhye Kang, Hyog...
SCN
2004
Springer
121views Communications» more  SCN 2004»
14 years 25 days ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel