Sciweavers

583 search results - page 51 / 117
» On the Complexity of Matsui's Attack
Sort
View
LATINCRYPT
2010
13 years 5 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
WWW
2007
ACM
14 years 8 months ago
A password stretching method using user specific salts
In this paper, we present a password stretching method using user specific salts. Our scheme takes similar time to stretch a password as recent password stretching algorithms, but...
ChangHee Lee, Heejo Lee
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 7 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
SIAMAM
2008
75views more  SIAMAM 2008»
13 years 7 months ago
Models of Virulent Phage Growth with Application to Phage Therapy
We modify existing models of bacteriophage growth on an exponentially growing bacterial population by including (1) density dependent phage attack rates and (2) loss to phage due ...
Hal L. Smith
ESORICS
2012
Springer
11 years 9 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...