Sciweavers

362 search results - page 33 / 73
» Abstraction in Cryptography
Sort
View
FC
2005
Springer
80views Cryptology» more  FC 2005»
14 years 2 months ago
A User-Friendly Approach to Human Authentication of Messages
Abstract. Users are often forced to trust potentially malicious terminals when trying to interact with a remote secure system. This paper presents an approach for ensuring the inte...
Jeff King, André L. M. dos Santos
FPL
2005
Springer
110views Hardware» more  FPL 2005»
14 years 2 months ago
CUSTARD - A Customisable Threaded FPGA Soft Processor and Tools
Abstract. We propose CUSTARD — CUStomisable Threaded ARchitecture — a soft processor design space that combines support for multiple hardware threads and automatically generate...
Robert G. Dimond, Oskar Mencer, Wayne Luk
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
14 years 2 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
14 years 2 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
HIP
2005
Springer
124views Cryptology» more  HIP 2005»
14 years 2 months ago
How Much Assurance Does a PIN Provide?
Abstract. We would like to quantify the assurance contained in an authentication secret. For instance, how much assurance does a customer convey to a bank by revealing that his Per...
Jon Louis Bentley, Colin Mallows