Sciweavers

1562 search results - page 16 / 313
» Mathematics, Cryptology, Security
Sort
View
ASIACRYPT
2008
Springer
13 years 10 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
CANS
2007
Springer
154views Cryptology» more  CANS 2007»
14 years 2 months ago
Forward-Secure Key Evolution in Wireless Sensor Networks
We consider a key distribution scheme for securing node-to-node communication in sensor networks. While most schemes in use are based on random predistribution, we consider a syste...
Marek Klonowski, Miroslaw Kutylowski, Michal Ren, ...