Sciweavers

488 search results - page 23 / 98
» Policy-Based Cryptography and Applications
Sort
View
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 23 days ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
COMPSYSTECH
2010
13 years 7 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
ENTCS
2007
96views more  ENTCS 2007»
13 years 7 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
EUROCRYPT
2005
Springer
14 years 28 days ago
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secu...
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishim...
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
14 years 18 days ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar