Sciweavers

1562 search results - page 155 / 313
» Mathematics, Cryptology, Security
Sort
View
PKC
2010
Springer
179views Cryptology» more  PKC 2010»
14 years 9 days ago
Preventing Pollution Attacks in Multi-source Network Coding
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipi...
Shweta Agrawal, Dan Boneh, Xavier Boyen, David Man...
PQCRYPTO
2010
187views Cryptology» more  PQCRYPTO 2010»
14 years 9 days ago
Information-Set Decoding for Linear Codes over Fq
The best known non-structural attacks against code-based cryptosystems are based on information-set decoding. Stern’s algorithm and its improvements are well optimized and the co...
Christiane Peters
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
14 years 9 days ago
Proposal of a Signature Scheme Based on STS Trapdoor
A New digital signature scheme based on Stepwise Triangular Scheme (STS) is proposed. The proposed trapdoor has resolved the vulnerability of STS and secure against both Gr¨obner ...
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, ...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 9 days ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
FC
2010
Springer
163views Cryptology» more  FC 2010»
14 years 8 days ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov