Sciweavers

83 search results - page 6 / 17
» Improved Cryptanalysis of Skein
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 7 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
FSE
1997
Springer
119views Cryptology» more  FSE 1997»
13 years 11 months ago
Cryptanalysis of Ladder-DES
Feistel ciphers are very common and very important in the design and analysis of blockciphers, especially due to four reasons: (1) Many (DES-like) ciphers are based on Feistel’s ...
Eli Biham
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 7 months ago
An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images
Motivated by the work of Uehara et al. [1], an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds ...
Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C.-...
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 7 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
13 years 11 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares