Sciweavers

849 search results - page 59 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 4 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
IJES
2006
93views more  IJES 2006»
13 years 10 months ago
Dynamically configurable security for SRAM FPGA bitstreams
This paper proposes a solution to improve the security of SRAM FPGAs through bitstream encryption. This proposition is distinct from other works because it uses the latest capabil...
Lilian Bossuet, Guy Gogniat, Wayne Burleson
SPLST
2003
13 years 11 months ago
Secure SMS messaging using Quasigroup encryption and Java SMS API
SMS (Short Message Service) is a widely used service for brief communication. Occasionally the data sent using SMS services is confidential in nature and is desired not to be disc...
Marko Hassinen, Smile Markovski
WS
2006
ACM
14 years 4 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
JTAER
2010
121views more  JTAER 2010»
13 years 8 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...