Sciweavers

948 search results - page 131 / 190
» Attacking cryptographic schemes based on
Sort
View
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
13 years 5 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 12 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
ICMCS
2005
IEEE
130views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Research on Wavelet Domain Fractal Coding in Digital Watermarking
A novel digital image watermarking method based on wavelet domain fractal coding is presented in this paper. Employing the invariant parameters of the wavelet domain fractal trans...
Li Yang, Du Sidan
IH
2005
Springer
14 years 1 months ago
A Family of Collusion 2-Secure Codes
Abstract. We present systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting...
Josep Cotrina Navau, Marcel Fernandez, Miguel Sori...