Sciweavers

1054 search results - page 9 / 211
» Secret Communication with Feedback
Sort
View
130
Voted
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
15 years 7 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
193
Voted
ESAS
2007
Springer
15 years 7 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
115
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
124
Voted
VTC
2008
IEEE
102views Communications» more  VTC 2008»
15 years 10 months ago
CQI Feedback Reduction Based on Spatial Correlation in OFDMA System
— In OFDMA systems, channel quality information (CQI) feedback is used to determine the modulation and coding level of a mobile station (MS). When the MS uses diversity, it trans...
Woongsup Lee, Dong-Ho Cho
123
Voted
FOCS
2007
IEEE
15 years 10 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak