Sciweavers

1898 search results - page 34 / 380
» Weak Keys for IDEA
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
13 years 10 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
EUROCRYPT
2000
Springer
14 years 8 days ago
Authenticated Key Exchange Secure against Dictionary Attacks
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, ...
Mihir Bellare, David Pointcheval, Phillip Rogaway
SP
2000
IEEE
112views Security Privacy» more  SP 2000»
14 years 1 months ago
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
In this paper, we describe a novel approach to scalable group re-keying for secure multicast. Our approach, which we call Kronos, is based upon the idea of periodic group re-keyin...
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric...
ICPR
2010
IEEE
13 years 10 months ago
Recognizing Human Actions Using Key Poses
In this paper, we explore the idea of using only pose, without utilizing any temporal information, for human action recognition. In contrast to the other studies using complex acti...
Sermetcan Baysal, Mehmet Can Kurt, Pinar Duygulu
IJNSEC
2008
175views more  IJNSEC 2008»
13 years 8 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das