Sciweavers

1054 search results - page 9 / 211
» Secret Communication with Feedback
Sort
View
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
13 years 11 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
ESAS
2007
Springer
13 years 11 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ASIACRYPT
2004
Springer
14 years 24 days ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
VTC
2008
IEEE
102views Communications» more  VTC 2008»
14 years 1 months ago
CQI Feedback Reduction Based on Spatial Correlation in OFDMA System
— In OFDMA systems, channel quality information (CQI) feedback is used to determine the modulation and coding level of a mobile station (MS). When the MS uses diversity, it trans...
Woongsup Lee, Dong-Ho Cho
FOCS
2007
IEEE
14 years 1 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak