Sciweavers

29 search results - page 1 / 6
» acns 2008
Sort
View
ACNS
2008
Springer
102views Cryptology» more  ACNS 2008»
13 years 11 months ago
Repelling Detour Attack Against Onions with Re-encryption
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
ACNS
2008
Springer
106views Cryptology» more  ACNS 2008»
13 years 11 months ago
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan Damgård, Lars R. Knudsen, Søren ...
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
13 years 11 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar
CSE
2008
IEEE
13 years 6 months ago
ACN: An Associative Classifier with Negative Rules
Classification using association rules has added a new dimension to the ongoing research for accurate classifiers. Over the years, a number of associative classifiers based on pos...
Gourab Kundu, Md. Monirul Islam, Sirajum Munir, Md...
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
13 years 11 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer