Sciweavers

849 search results - page 5 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
USS
2008
13 years 9 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno
CORR
2007
Springer
56views Education» more  CORR 2007»
13 years 7 months ago
Deciding security properties for cryptographic protocols. Application to key cycles
Hubert Comon-Lundh, Véronique Cortier, Euge...
ACISP
2005
Springer
14 years 1 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
IACR
2011
94views more  IACR 2011»
12 years 7 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
WISEC
2010
ACM
14 years 9 days ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru