Sciweavers

362 search results - page 15 / 73
» Abstraction in Cryptography
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
13 years 11 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
14 years 2 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
14 years 2 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 1 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 29 days ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler