Sciweavers

2517 search results - page 278 / 504
» Secure Deployment of Components
Sort
View
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
14 years 1 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
13 years 11 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
CISSE
2008
Springer
13 years 11 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
CONEXT
2007
ACM
13 years 11 months ago
A next generation internet architecture for mobility and multi-homing support
The current internetworking architecture presents some limitations to naturally support mobility and multi-homing. Among the limitations, the IP semantic overload seems to be a pr...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...