Sciweavers

610 search results - page 57 / 122
» Predicate-Based Key Exchange
Sort
View
CCS
2006
ACM
14 years 16 days ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
CCR
2000
101views more  CCR 2000»
13 years 8 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
VLSID
2002
IEEE
79views VLSI» more  VLSID 2002»
14 years 9 months ago
A Power Minimization Technique for Arithmetic Circuits by Cell Selection
As a basic cell of arithmetic circuits, a one-bit full adder and a counter are usually used. Minimizing power consumption of these components is a key issue for low-power circuit ...
Masanori Muroyama, Tohru Ishihara, Akihiko Hyodo, ...
ESORICS
2007
Springer
14 years 3 months ago
Adaptive Soundness of Static Equivalence
Abstract. We define a framework to reason about implementations of equational theories in the presence of an adaptive adversary. We particularly focus on soundess of static equiva...
Steve Kremer, Laurent Mazaré
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...