Sciweavers

515 search results - page 31 / 103
» Secure Parameters for SWIFFT
Sort
View
ICICS
2004
Springer
14 years 3 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
IWDW
2004
Springer
14 years 3 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
EUROCRYPT
2003
Springer
14 years 3 months ago
A Forward-Secure Public-Key Encryption Scheme
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious concern. Forward security allows one to mitigate the...
Ran Canetti, Shai Halevi, Jonathan Katz
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 11 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
IAT
2007
IEEE
14 years 4 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...