Sciweavers

1562 search results - page 287 / 313
» Mathematics, Cryptology, Security
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 2 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 2 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
14 years 2 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel
INDOCRYPT
2007
Springer
14 years 2 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
14 years 2 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom