Sciweavers

9 search results - page 1 / 2
» scn 2004
Sort
View
SCN
2004
Springer
14 years 6 days ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
SCN
2008
Springer
141views Communications» more  SCN 2008»
13 years 6 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
SCN
2004
Springer
121views Communications» more  SCN 2004»
14 years 6 days ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
SCN
2004
Springer
112views Communications» more  SCN 2004»
14 years 6 days ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg