Sciweavers

29 search results - page 1 / 6
» acns 2008
Sort
View
ACNS
2008
Springer
102views Cryptology» more  ACNS 2008»
14 years 4 days ago
Repelling Detour Attack Against Onions with Re-encryption
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
ACNS
2008
Springer
106views Cryptology» more  ACNS 2008»
14 years 4 days ago
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan Damgård, Lars R. Knudsen, Søren ...
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
14 years 4 days ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar
CSE
2008
IEEE
13 years 7 months ago
ACN: An Associative Classifier with Negative Rules
Classification using association rules has added a new dimension to the ongoing research for accurate classifiers. Over the years, a number of associative classifiers based on pos...
Gourab Kundu, Md. Monirul Islam, Sirajum Munir, Md...
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 4 days ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer