Sciweavers

8 search results - page 2 / 2
» acns 2011
Sort
View
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
12 years 8 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 8 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IACR
2011
121views more  IACR 2011»
12 years 4 months ago
Two RFID Privacy Models in Front of a Court
In ASIACRYPT 2007, Vaudenay proposed a comprehensive privacy model for unilateral RFID schemes. Soon after, in ASIACCS 2008, Paise and Vaudenay presented a new version of the cited...
Mohammad Hassan Habibi, Mohammad Reza Aref