Sciweavers

362 search results - page 48 / 73
» Extending the Resynchronization Attack
Sort
View
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
14 years 5 days ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
FSE
2008
Springer
115views Cryptology» more  FSE 2008»
13 years 10 months ago
On the Salsa20 Core Function
In this paper, we point out some weaknesses in the Salsa20 core function that could be exploited to obtain up to 231 collisions for its full (20 rounds) version. We first find an i...
Julio César Hernández Castro, Juan M...
I3E
2001
196views Business» more  I3E 2001»
13 years 10 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
DAGSTUHL
1994
13 years 9 months ago
The Rampart Toolkit for Building High-Integrity Services
Abstract. Rampart is a toolkit of protocols to facilitate the development of high-integrity services, i.e., distributed services that retain their availability and correctness desp...
Michael K. Reiter
COMCOM
2008
87views more  COMCOM 2008»
13 years 8 months ago
Providing VANET security through active position detection
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing positi...
Gongjun Yan, Stephan Olariu, Michele C. Weigle