Sciweavers

5 search results - page 1 / 1
» How to Construct State Registries-Matching Undeniability wit...
Sort
View
ACIIDS
2010
IEEE
120views Database» more  ACIIDS 2010»
14 years 3 days ago
How to Construct State Registries-Matching Undeniability with Public Security
Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
MOBIHOC
2005
ACM
14 years 10 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
IACR
2011
88views more  IACR 2011»
12 years 10 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
13 years 1 months ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
ISW
2007
Springer
14 years 5 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel