Sciweavers

948 search results - page 17 / 190
» Attacking cryptographic schemes based on
Sort
View
CODES
2004
IEEE
13 years 11 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
ACSAC
2009
IEEE
14 years 1 months ago
A Guided Tour Puzzle for Denial of Service Prevention
Abstract—Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a l...
Mehmud Abliz, Taieb Znati
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
14 years 1 days ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
14 years 1 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
DAM
2007
63views more  DAM 2007»
13 years 7 months ago
Attacking a public key cryptosystem based on tree replacement
We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success...
Maria Isabel Gonzalez Vasco, David Pérez-Ga...