Sciweavers

362 search results - page 2 / 73
» Extending the Resynchronization Attack
Sort
View
IJACT
2010
67views more  IJACT 2010»
12 years 11 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
ICMCS
2005
IEEE
102views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Content-based block watermarking against cumulative and temporal attack
— This paper presents a block-selection-based video watermarking scheme that is designed to be resilient against two dangerous attacks: cumulative attack and temporal attack. We ...
Ju Wang, Jonathan C. L. Liu
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
13 years 11 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
NDSS
1999
IEEE
13 years 9 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot