Sciweavers

13 search results - page 1 / 3
» sacrypt 2004
Sort
View
123
Voted
SACRYPT
2004
Springer
106views Cryptology» more  SACRYPT 2004»
15 years 10 months ago
Product Construction of Key Distribution Schemes for Sensor Networks
Ruizhong Wei, Jiang Wu
108
Voted
SACRYPT
2004
Springer
15 years 10 months ago
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
Duong Hieu Phan, David Pointcheval
103
Voted
SACRYPT
2004
Springer
135views Cryptology» more  SACRYPT 2004»
15 years 10 months ago
An Improved Correlation Attack on A5/1
Alexander Maximov, Thomas Johansson, Steve Babbage
SACRYPT
2004
Springer
15 years 10 months ago
Modular Number Systems: Beyond the Mersenne Family
Jean-Claude Bajard, Laurent Imbert, Thomas Plantar...
139
Voted
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
15 years 10 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel