Sciweavers

1834 search results - page 161 / 367
» Public Key Cryptography
Sort
View
MSWIM
2005
ACM
14 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 1 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
ISPA
2005
Springer
14 years 3 months ago
ID-Based Proxy Signature Using Bilinear Pairings
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate securit...
Jing Xu, Zhenfeng Zhang, Dengguo Feng
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 3 months ago
Merkle Signatures with Virtually Unlimited Signature Capacity
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a cryptographically unlimited (280 ) number of documents ...
Johannes Buchmann, Erik Dahmen, Elena Klintsevich,...
FSE
2003
Springer
110views Cryptology» more  FSE 2003»
14 years 2 months ago
Loosening the KNOT
Abstract. In this paper, we present differential attacks on the selfsynchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 26...
Antoine Joux, Frédéric Muller