Sciweavers

562 search results - page 29 / 113
» Recent Developments in the Design of Conventional Cryptograp...
Sort
View
118
Voted
CCS
2007
ACM
15 years 9 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros
115
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
141
Voted
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 8 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
154
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Networking low-power energy harvesting devices: Measurements and algorithms
—Recent advances in energy harvesting materials and ultra-low-power communications will soon enable the realization of networks composed of energy harvesting devices. These devic...
Maria Gorlatova, Aya Wallwater, Gil Zussman
HOTI
2002
IEEE
15 years 8 months ago
Stable Round-Robin Scheduling Algorithms for High-Performance Input Queued Switches
High-performance input-queued switches require highspeed scheduling algorithms while maintaining good performance. Various round-robin scheduling algorithms for Virtual Output Que...
Jing Liu, Chun Kit Hung, Mounir Hamdi, Chi-Ying Ts...