Sciweavers

468 search results - page 41 / 94
» Security Weaknesses in Bluetooth
Sort
View
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 8 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 8 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
CRYPTOLOGIA
2007
81views more  CRYPTOLOGIA 2007»
13 years 8 months ago
Sigaba: Cryptanalysis of the Full Keyspace
In this paper we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is used. The attack highlights various strengths and weaknesses o...
Mark Stamp, Wing On Chan
AMC
2005
121views more  AMC 2005»
13 years 8 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao