Sciweavers

IWSEC
2007
Springer
14 years 6 months ago
How to Find Many Collisions of 3-Pass HAVAL
The hash function HAVAL is an Australian extension of well known Merkle-Damg˚ard hash functions such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVA...
Kazuhiro Suzuki, Kaoru Kurosawa
IWSEC
2007
Springer
14 years 6 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
IWSEC
2007
Springer
14 years 6 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
IWSEC
2007
Springer
14 years 6 months ago
Processing Multi-parameter Attacktrees with Estimated Parameter Values
Abstract. Authors extend the multi-parameter attacktree model to include inaccurate or estimated parameter values, which are modelled as probabilistic interval estimations. The pap...
Aivo Jürgenson, Jan Willemson
IWSEC
2007
Springer
14 years 6 months ago
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique
Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii
IWSEC
2007
Springer
14 years 6 months ago
On Security Models and Compilers for Group Key Exchange Protocols
Emmanuel Bresson, Mark Manulis, Jörg Schwenk
IWSEC
2007
Springer
14 years 6 months ago
GAS: Overloading a File Sharing Network as an Anonymizing System
Anonymity is considered as a valuable property as far as everyday transactions in the Internet are concerned. Users care about their privacy and they seek for new ways to keep sec...
Elias Athanasopoulos, Mema Roussopoulos, Kostas G....
IWSEC
2007
Springer
14 years 6 months ago
Run-Time Randomization to Mitigate Tampering
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tri...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
IWSEC
2007
Springer
14 years 6 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...