Sciweavers

CANS
2009
Springer
152views Cryptology» more  CANS 2009»
14 years 6 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
CANS
2009
Springer
109views Cryptology» more  CANS 2009»
14 years 6 months ago
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
This paper describes the design of a fast multi-core library for the cryptographic Tate pairing over supersingular elliptic curves. For the computation of the reduced modified Tat...
Jean-Luc Beuchat, Emmanuel López-Trejo, Lui...
CANS
2009
Springer
169views Cryptology» more  CANS 2009»
14 years 6 months ago
Privacy-Preserving Relationship Path Discovery in Social Networks
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Pa...
CANS
2009
Springer
150views Cryptology» more  CANS 2009»
14 years 6 months ago
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang,...
CANS
2009
Springer
128views Cryptology» more  CANS 2009»
14 years 6 months ago
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu
CANS
2009
Springer
115views Cryptology» more  CANS 2009»
14 years 6 months ago
Private-Key Hidden Vector Encryption with Key Confidentiality
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CANS
2009
Springer
153views Cryptology» more  CANS 2009»
14 years 6 months ago
Computing on Encrypted Data
Craig Gentry
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
14 years 6 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 6 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 6 months ago
An Analysis of the Compact XSL Attack on BES and Embedded SMS4
The XSL attack when applied on BES-128 has been shown to have an attack complexity of 2100 , which is faster than exhaustive search. However at FSE 2007, Lim and Khoo analyzed the ...
Jiali Choy, Huihui Yap, Khoongming Khoo