Sciweavers

947 search results - page 6 / 190
» Provable Implementations of Security Protocols
Sort
View
FSE
2008
Springer
109views Cryptology» more  FSE 2008»
13 years 10 months ago
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouf...
PERCOM
2005
ACM
14 years 8 months ago
A Scalable and Provably Secure Hash-Based RFID Protocol
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been...
Gildas Avoine, Philippe Oechslin
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
On Session Key Construction in Provably-Secure Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
CCS
2008
ACM
13 years 10 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
POST
2012
181views more  POST 2012»
12 years 4 months ago
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
Abstract. We formally analyze the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous weaknesses, both old and new, including some th...
David A. Basin, Cas J. F. Cremers, Simon Meier