Sciweavers

15375 search results - page 109 / 3075
» cans 2008
Sort
View
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 2 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 8 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
DM
2008
110views more  DM 2008»
13 years 8 months ago
A novel algorithm enumerating bent functions
By the relationship between the Walsh spectra at partial points and the Walsh spectra of its sub-functions, by the action of general linear group on the set of Boolean functions, ...
Qingshu Meng, Min Yang, Huanguo Zhang, Jingsong Cu...
SIAMAM
2008
89views more  SIAMAM 2008»
13 years 7 months ago
An Interaction Theory for Scattering by Defects in Arrays
Wave scattering by an array of bodies that is periodic except for a finite number of missing or irregular elements is considered. The field is decomposed into contributions from a...
I. Thompson, C. M. Linton
ENTCS
2008
83views more  ENTCS 2008»
13 years 8 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen