Sciweavers

27 search results - page 6 / 6
» Cryptanalysis of the Secure Sessions from Weak Secrets Proto...
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 9 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
JUCS
2008
113views more  JUCS 2008»
13 years 5 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...