Sciweavers

134 search results - page 17 / 27
» Practical Collisions for EnRUPT
Sort
View
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
PRESENCE
2008
185views more  PRESENCE 2008»
13 years 7 months ago
Pilot Evaluation Study of a Virtual Paracentesis Simulator for Skill Training and Assessment: The Beneficial Effect of Haptic Di
Effective, real-time training of health care professionals in invasive procedures is a challenging task. Furthermore, assessing in practice the acquisition of the dexterity and sk...
Costas S. Tzafestas, Kostas Birbas, Yiannis Koumpo...
ISW
2009
Springer
14 years 2 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
VTC
2007
IEEE
14 years 1 months ago
Performance Evaluation of A Multiuser Detection Based MAC Design for Ad Hoc Networks
Abstract— In general, the performance and radio resource utilization of Ad Hoc networks are limited by half-duplex operation and possible collisions. In this paper, we propose a ...
Jinfang Zhang, Zbigniew Dziong, François Ga...
ACISP
2007
Springer
14 years 1 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...