Sciweavers

462 search results - page 30 / 93
» Authentication of Quantum Messages
Sort
View
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 3 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 9 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
ICIP
2003
IEEE
14 years 10 months ago
Graphical indicia
We present an authenticable graphical barcode symbology, and describe a system for its reliable encoding and decoding. The graphical barcode is generated by modulating halftone pa...
Doron Shaked, Zachi Baharav, Avi Levy, Jonathan Ye...
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 3 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent