Sciweavers

1190 search results - page 58 / 238
» Secure off-the-record messaging
Sort
View
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
15 years 9 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
IMCSIT
2010
15 years 2 months ago
Undetectable Spread-time Stegosystem Based on Noisy Channels
We consider a scenario where an attacker is able to receive a stegosignal only over a Gaussian channel. But in order to provide security of this channel noise
Valery I. Korzhik, Guillermo Morales-Luna, Ksenia ...
CORR
2008
Springer
71views Education» more  CORR 2008»
15 years 4 months ago
On the Secure Degrees of Freedom of Wireless X Networks
Previous work showed that the X network with M transmitters, N receivers has MN M+N-1 degrees of freedom. In this work we study the degrees of freedom of the X network with secrecy...
Tiangao Gou, Syed Ali Jafar
MOBICOM
2006
ACM
15 years 10 months ago
An identity-based security framework For VANETs
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide authentication, confidentiality, non-repudiation and message...
Pandurang Kamat, Arati Baliga, Wade Trappe
SOFSEM
2005
Springer
15 years 10 months ago
On the Security and Composability of the One Time Pad
Motivated by a potentially flawed deployment of the one time pad in a recent quantum cryptographic application securing a bank transfer [12], we show how to implement a statistica...
Dominik Raub, Rainer Steinwandt, Jörn Mü...