Sciweavers

1064 search results - page 32 / 213
» Cryptography from Anonymity
Sort
View
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 2 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 3 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
FOCS
2008
IEEE
14 years 2 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 8 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
EUROCRYPT
1993
Springer
14 years 3 days ago
Differentially Uniform Mappings for Cryptography
This work is motivated by the observation that in DES-like ciphexs it is possible to choose the round functions in such a way that every non-trivial one-round characteristic has sm...
Kaisa Nyberg