Sciweavers

84 search results - page 17 / 17
» On the Security Loss in Cryptographic Reductions
Sort
View
CSFW
2002
IEEE
13 years 10 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
VTC
2006
IEEE
102views Communications» more  VTC 2006»
13 years 11 months ago
A Fast Handoff Mechanism for IEEE 802.11 and IAPP Networks
Handoff is a critical issue in IEEE 802.11-based wireless networks. In this paper we propose a fast and seamless handoff solution for IEEE 802.11 wireless LAN with IAPP. It is base...
Ping-Jung Huang, Yu-Chee Tseng, Kun-Cheng Tsai
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
13 years 12 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
13 years 11 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold