Sciweavers

248 search results - page 2 / 50
» Authentication Primitives and Their Compilation
Sort
View
ASIACRYPT
1990
Springer
13 years 9 months ago
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry
SSS
2009
Springer
13 years 11 months ago
A Wireless Security Framework without Shared Secrets
This paper develops a framework for wireless security that provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver n...
Lifeng Sang, Anish Arora
IJISEC
2010
121views more  IJISEC 2010»
13 years 3 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
FC
2005
Springer
110views Cryptology» more  FC 2005»
13 years 10 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
PPOPP
1997
ACM
13 years 9 months ago
Effective Fine-Grain Synchronization for Automatically Parallelized Programs Using Optimistic Synchronization Primitives
As shared-memory multiprocessors become the dominant commodity source of computation, parallelizing compilers must support mainstream computations that manipulate irregular, point...
Martin C. Rinard