Sciweavers

1449 search results - page 162 / 290
» Secure and Efficient Metering
Sort
View
MOBIHOC
2005
ACM
16 years 4 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
ITNG
2007
IEEE
15 years 11 months ago
Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates
This contribution proposes a modification of method of divisors group operation in the Jacobian of hyperelliptic curve over even and odd characteristic fields in projective coordi...
Thomas Wollinger, Vladyslav Kovtun
ASIACRYPT
1992
Springer
15 years 8 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
15 years 8 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
IJNSEC
2006
72views more  IJNSEC 2006»
15 years 4 months ago
Cryptanalysis of Koyama Scheme
In this paper we analyze the security of Koyama scheme based on the singular cubic curve for some well known attacks. We provide an efficient algorithm for linearly related plaint...
Sahadeo Padhye