Sciweavers

515 search results - page 20 / 103
» Secure Parameters for SWIFFT
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
14 years 1 months ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
CONEXT
2005
ACM
14 years 18 hour ago
Path key establishment using multiple secured paths in wireless sensor networks
Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring...
Guanfeng Li, Hui Ling, Taieb Znati
AGENTS
2000
Springer
14 years 2 months ago
Verbal communication: using approximate sound propagation to design an inter-agents communication language
In this paper, we will present a method for generating conversations between human-like agents by proposing specific parameters for inter-agents messages with an approximation of...
Jean-Sébastien Monzani, Daniel Thalmann
EUROCRYPT
2000
Springer
14 years 1 months ago
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation
We show that although unconditionally secure quantum bit commitment is impossible, it can be based upon any family of quantum one-way permutations. The resulting scheme is uncondit...
Paul Dumais, Dominic Mayers, Louis Salvail